-
Notifications
You must be signed in to change notification settings - Fork 105
[SECURITY] Prevent rhostname
array overflow
#516
base: master
Are you sure you want to change the base?
[SECURITY] Prevent rhostname
array overflow
#516
Conversation
be the case that `vallen >= len + sizeof(rhostname)`. This PR fixes the check so the `rhostname` array does not overflow. Reported-by: Github Security Lab <[email protected]> Signed-off-by: Alvaro Muñoz <[email protected]>
Thanks for your pull request. It looks like this may be your first contribution to a Google open source project (if not, look below for help). Before we can look at your pull request, you'll need to sign a Contributor License Agreement (CLA). 📝 Please visit https://cla.developers.google.com/ to sign. Once you've signed (or fixed any issues), please reply here with What to do if you already signed the CLAIndividual signers
Corporate signers
ℹ️ Googlers: Go here for more info. |
1 similar comment
Thanks for your pull request. It looks like this may be your first contribution to a Google open source project (if not, look below for help). Before we can look at your pull request, you'll need to sign a Contributor License Agreement (CLA). 📝 Please visit https://cla.developers.google.com/ to sign. Once you've signed (or fixed any issues), please reply here with What to do if you already signed the CLAIndividual signers
Corporate signers
ℹ️ Googlers: Go here for more info. |
Codecov Report
@@ Coverage Diff @@
## master #516 +/- ##
==========================================
- Coverage 54.16% 54.16% -0.01%
==========================================
Files 329 329
Lines 57161 57161
==========================================
- Hits 30964 30962 -2
- Misses 26197 26199 +2
Continue to review full report at Codecov.
|
This has already been fixed identically in lwip upstream (see http://git.savannah.nongnu.org/cgit/lwip.git/tree/src/netif/ppp/eap.c#n1426). However, OpenWeave doesn't use PPP or EAP in LwIP, so this is a no-op for OpenWeave one way or another. |
This is an automatically generated security fix for a vulnerability detected in your code which is a variant of CVE-2020-8597.
You can read in more detail about this vulnerability in CERT Advisory VU#782301.
The vulnerability occurs because, given that
vallen
was checked to be less thanlen
, it can never be the case thatvallen >= len + sizeof(rhostname)
. Therefore,rhostname
never gets trimmed and therhostname
array may overflow.While this PR was generated for your project automatically, the supporting analysis was performed and verified by the GitHub Security Lab.
The original finding was reported by Ilja Van Sprundel from IOActive.
The proposed patch was developed by Paul Mackerras (paulusmack) from the Samba project in
paulusmack/ppp@8d7970b#diff-b7f5f2404cf3f5c09b1f8ad9364bb340.
The original vulnerability got assigned CVE-2020-8597 which has a CVSS v3.1 Base Score of 9.8/10.
Source
The source code that generated and submitted this PR is based on JLLeitschuh/bulk-security-pr-generator.
Opting-Out
This bot will respect the ROBOTS.txt format. If you'd like to opt-out of any future automated security vulnerability fixes like this, please consider adding a file called
.github/GH-ROBOTS.txt
to your repository with the line:'''
User-agent: GSL/bulk-security-pr-generator
Disallow: *
'''
Alternatively, if this project is no longer actively maintained, consider archiving the repository.
CLA Requirements
This section is only relevant if your project requires contributors to sign a Contributor License Agreement (CLA) for external contributions.
It is unlikely that we will be able to directly sign CLAs. However, all contributed commits are already automatically signed-off.
If signing your organization's CLA is a strict-requirement for merging this contribution, please feel free to close this PR.