mirror of
https://git.proxmox.com/git/mirror_frr
synced 2025-08-13 22:57:45 +00:00
ospfd: CVE-2011-3326 (uknown LSA type segfault)
This vulnerability (CERT-FI #514837) was reported by CROSS project. They have also suggested a fix to the problem, which was found acceptable. Quagga ospfd does not seem to handle unknown LSA types in a Link State Update message correctly. If LSA type is something else than one supported by Quagga, the default handling of unknown types leads to an error. * ospf_flood.c * ospf_flood(): check return value of ospf_lsa_install()
This commit is contained in:
parent
94431dbc75
commit
6b161fc12a
@ -319,7 +319,8 @@ ospf_flood (struct ospf *ospf, struct ospf_neighbor *nbr,
|
|||||||
procedure cannot overwrite the newly installed LSA until
|
procedure cannot overwrite the newly installed LSA until
|
||||||
MinLSArrival seconds have elapsed. */
|
MinLSArrival seconds have elapsed. */
|
||||||
|
|
||||||
new = ospf_lsa_install (ospf, nbr->oi, new);
|
if (! (new = ospf_lsa_install (ospf, nbr->oi, new)))
|
||||||
|
return 0; /* unknown LSA type */
|
||||||
|
|
||||||
/* Acknowledge the receipt of the LSA by sending a Link State
|
/* Acknowledge the receipt of the LSA by sending a Link State
|
||||||
Acknowledgment packet back out the receiving interface. */
|
Acknowledgment packet back out the receiving interface. */
|
||||||
|
Loading…
Reference in New Issue
Block a user