+2007-09-07 Paul Jakma <paul.jakma@sun.com>
+
+ * (general) bgpd can be made crash by remote peers if debug
+ bgp updates is set, due to NULL pointer dereference.
+ Reported by "Mu Security Research Team",
+ <security@musecurity.com>.
+ * bgp_attr.c: (bgp_attr_community) If community length is 0,
+ don't set the community-present attribute bit, just return
+ early.
+ * bgp_debug.c: (community_str,community_com2str) Check com
+ pointer before dereferencing.
+
2007-08-27 Paul Jakma <paul.jakma@sun.com>
* bgp_route.c: (bgp_announce_check) Fix bug #398, slight
struct attr *attr, u_char flag)
{
if (length == 0)
- attr->community = NULL;
+ {
+ attr->community = NULL;
+ return 0;
+ }
else
{
attr->community =
u_int16_t as;
u_int16_t val;
+ if (!com)
+ return NULL;
+
/* When communities attribute is empty. */
if (com->size == 0)
{
char *
community_str (struct community *com)
{
+ if (!com)
+ return NULL;
+
if (! com->str)
com->str = community_com2str (com);
return com->str;