Check for truncated source address when receiving packets
This commit is contained in:
parent
192f74f0a1
commit
ff4abc69c3
2 changed files with 6 additions and 0 deletions
3
cmdmon.c
3
cmdmon.c
|
@ -1644,6 +1644,9 @@ read_from_cmd_socket(void *anything)
|
|||
return;
|
||||
}
|
||||
|
||||
if (from_length > sizeof (where_from))
|
||||
LOG_FATAL(LOGF_CmdMon, "Truncated source address");
|
||||
|
||||
read_length = status;
|
||||
|
||||
LCL_ReadRawTime(&now);
|
||||
|
|
3
ntp_io.c
3
ntp_io.c
|
@ -481,6 +481,9 @@ read_from_socket(void *anything)
|
|||
reponse on a subsequent recvfrom). */
|
||||
|
||||
if (status > 0) {
|
||||
if (msg.msg_namelen > sizeof (where_from))
|
||||
LOG_FATAL(LOGF_NtpIO, "Truncated source address");
|
||||
|
||||
switch (where_from.u.sa_family) {
|
||||
case AF_INET:
|
||||
remote_addr.ip_addr.family = IPADDR_INET4;
|
||||
|
|
Loading…
Reference in a new issue