summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorLorenzo Colitti <lorenzo@google.com>2017-08-15 14:44:49 +0900
committerWolfEnders <grzwolf1@gmail.com>2017-10-04 19:34:21 +0200
commit382522ef26f9694dc3faa02681077c563590cd47 (patch)
tree41cda7f632db5c567e2204deef602d40e6c3ae42
parent131a58b56687860f4c071c1fad15ebc4b619cdd0 (diff)
downloadandroid_external_dnsmasq-cm-11.0.tar.gz
android_external_dnsmasq-cm-11.0.tar.bz2
android_external_dnsmasq-cm-11.0.zip
Make dnsmasq more stable.cm-11.0
1. Fix the length check in extract_name. 2. Add a size check to answer_request. Bug: 64575136 Test: builds Test: wifi tethering works Change-Id: Ie38321ab02b7cfdc603958a884cd8f37724fedcc (cherry picked from commit f25df861463c07908f39d9b43fe8888a4b31e848)
-rwxr-xr-xsrc/rfc1035.c5
1 files changed, 4 insertions, 1 deletions
diff --git a/src/rfc1035.c b/src/rfc1035.c
index ca5ceba..a12c3b0 100755
--- a/src/rfc1035.c
+++ b/src/rfc1035.c
@@ -48,7 +48,7 @@ static int extract_name(HEADER *header, size_t plen, unsigned char **pp,
/* end marker */
{
/* check that there are the correct no of bytes after the name */
- if (!CHECK_LEN(header, p, plen, extrabytes))
+ if (!CHECK_LEN(header, p1 ? p1 : p, plen, extrabytes))
return 0;
if (isExtract)
@@ -1140,6 +1140,9 @@ size_t answer_request(HEADER *header, char *limit, size_t qlen,
struct crec *crecp;
int nxdomain = 0, auth = 1, trunc = 0;
struct mx_srv_record *rec;
+
+ // Make sure we do not underflow here too.
+ if (qlen > (limit - ((char *)header))) return 0;
/* If there is an RFC2671 pseudoheader then it will be overwritten by
partial replies, so we have to do a dry run to see if we can answer