summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorMike Frysinger <vapier@gentoo.org>2005-02-05 06:45:52 +0000
committerMike Frysinger <vapier@gentoo.org>2005-02-05 06:45:52 +0000
commit31d4c4ea57d7937b0becbba4fe521317e5939120 (patch)
treefc0bf428ccfd0333076d0fe6fb9a23ba361a6e8f /net-misc/netkit-rwho/files
parentAdded libtoolize --copy --force (bug #75569), and add a patch to fix compilat... (diff)
downloadgentoo-2-31d4c4ea57d7937b0becbba4fe521317e5939120.tar.gz
gentoo-2-31d4c4ea57d7937b0becbba4fe521317e5939120.tar.bz2
gentoo-2-31d4c4ea57d7937b0becbba4fe521317e5939120.zip
Add patch to fix DoS #78371.
(Portage version: 2.0.51-r15)
Diffstat (limited to 'net-misc/netkit-rwho/files')
-rw-r--r--net-misc/netkit-rwho/files/digest-netkit-rwho-0.17-r1 (renamed from net-misc/netkit-rwho/files/digest-netkit-rwho-0.17)0
-rw-r--r--net-misc/netkit-rwho/files/netkit-rwho-0.17-tiny-packet-dos.patch20
2 files changed, 20 insertions, 0 deletions
diff --git a/net-misc/netkit-rwho/files/digest-netkit-rwho-0.17 b/net-misc/netkit-rwho/files/digest-netkit-rwho-0.17-r1
index 5ed5db18811d..5ed5db18811d 100644
--- a/net-misc/netkit-rwho/files/digest-netkit-rwho-0.17
+++ b/net-misc/netkit-rwho/files/digest-netkit-rwho-0.17-r1
diff --git a/net-misc/netkit-rwho/files/netkit-rwho-0.17-tiny-packet-dos.patch b/net-misc/netkit-rwho/files/netkit-rwho-0.17-tiny-packet-dos.patch
new file mode 100644
index 000000000000..4c9b83063b47
--- /dev/null
+++ b/net-misc/netkit-rwho/files/netkit-rwho-0.17-tiny-packet-dos.patch
@@ -0,0 +1,20 @@
+If a user sends a packet which is smaller than WHDRSIZE, the code
+will later hit a loop which will result in the service faulting.
+A simple DoS where the server will be taken out, but something
+that should be fixed :).
+
+http://bugs.gentoo.org/show_bug.cgi?id=78371
+
+--- rwhod/rwhod.c
++++ rwhod/rwhod.c
+@@ -258,6 +258,10 @@
+ syslog(LOG_WARNING, "recv: %m");
+ continue;
+ }
++ if (cc < WHDRSIZE) {
++ syslog(LOG_WARNING, "packet too small");
++ continue;
++ }
+ if (from.sin_port != sp->s_port) {
+ syslog(LOG_WARNING, "%d: bad from port",
+ ntohs(from.sin_port));