summaryrefslogtreecommitdiff
path: root/ospfclient/ospfclient.py
diff options
context:
space:
mode:
authorOlivier Dugeon <olivier.dugeon@orange.com>2024-04-16 16:42:06 +0200
committerMergify <37929162+mergify[bot]@users.noreply.github.com>2024-05-24 19:33:36 +0000
commitcef38442420aeac8e163f8aa55f1b985908f993c (patch)
tree5c6f317c64408bbf4b6301b78733e64af0f9dfa2 /ospfclient/ospfclient.py
parent4e70b09f24b72fbb27ff5eda63393bfd2a72ef37 (diff)
ospfd: protect call to get_edge() in ospf_te.c
During fuzzing, Iggy Frankovic discovered that get_edge() function in ospf_te.c could return null pointer, in particular when the link_id or advertised router IP addresses are fuzzed. As the null pointer returned by get_edge() function is not handlei by calling functions, this could cause ospfd crash. This patch introduces new verification of returned pointer by get_edge() function and stop the processing in case of null pointer. In addition, link ID and advertiser router ID are validated before calling ls_find_edge_by_key() to avoid the creation of a new edge with an invalid key. CVE-2024-34088 Co-authored-by: Iggy Frankovic <iggyfran@amazon.com> Signed-off-by: Olivier Dugeon <olivier.dugeon@orange.com> (cherry picked from commit 8c177d69e32b91b45bda5fc5da6511fa03dc11ca)
Diffstat (limited to 'ospfclient/ospfclient.py')
0 files changed, 0 insertions, 0 deletions