haproxy/include
Willy Tarreau 0c219be3df BUG/MEDIUM: dns: fix accepted_payload_size parser to avoid integer overflow
Since commit 9d8dbbc ("MINOR: dns: Maximum DNS udp payload set to 8192") it's
possible to specify a packet size, but passing too large a size or a negative
size is not detected and results in memset() being performed over a 2GB+ area
upon receipt of the first DNS response, causing runtime crashes.

We now check that the size is not smaller than the smallest packet which is
the DNS header size (12 bytes).

No backport is needed.
2017-08-22 12:03:46 +02:00
..
common MINOR: ist: implement very simple indirect strings 2017-08-18 13:38:47 +02:00
import CLEANUP: da: move global settings out of the global section 2016-12-21 21:30:54 +01:00
proto MINOR: dns: Maximum DNS udp payload set to 8192 2017-08-22 11:39:57 +02:00
types BUG/MEDIUM: dns: fix accepted_payload_size parser to avoid integer overflow 2017-08-22 12:03:46 +02:00