Bug #2847
closed
rtadvd: improper padding of DNSSL option
Added by cmusser about 9 years ago.
Updated over 8 years ago.
Description
The rtadvd program, recently refreshed from FreeBSD, mishandles DNSSL
options, which need to be padded to an eight byte boundary. The code
correctly calculates the padding length, then fails to increment the
pointer used to write the packet data by this amount. As a result, all
subsequent option data gets written into the wrong place, making the
rest of the packet junk.
The attached patch (for the master branch) fixes this.
Files
Patch pushed.
On Tue, Oct 20, 2015 at 7:10 AM,
<bugtracker-admin@leaf.dragonflybsd.org> wrote:
Issue #2847 has been reported by cmusser.
----------------------------------------
Bug #2847: rtadvd: improper padding of DNSSL option
http://bugs.dragonflybsd.org/issues/2847
- Author: cmusser
- Status: New
- Priority: Normal
- Assignee:
- Category: Networking
- Target version: 4.2.x
----------------------------------------
The rtadvd program, recently refreshed from FreeBSD, mishandles DNSSL
options, which need to be padded to an eight byte boundary. The code
correctly calculates the padding length, then fails to increment the
pointer used to write the packet data by this amount. As a result, all
subsequent option data gets written into the wrong place, making the
rest of the packet junk.
The attached patch (for the master branch) fixes this.
---Files--------------------------------
rtadvd_config.c.diff (795 Bytes)
--
You have received this notification because you have either subscribed to it, or are involved in it.
To change your notification preferences, please click here: http://bugs.dragonflybsd.org/my/account
--
Tomorrow Will Never Die
Fixed according to sephe. Closing.
- Status changed from New to Closed
Also available in: Atom
PDF