blob: 7e033af5ee4e93fa7694516946b013a91a2ba189 [file] [log] [blame]
Patrick Williamsb48b7b42016-08-17 15:04:38 -05001[PATCH] fix CVE-2015-4047
2
3Upstream-Status: Backport
4
Brad Bishop34ae6002019-04-08 15:21:03 -04005CVE: CVE-2015-4047
6
Patrick Williamsb48b7b42016-08-17 15:04:38 -05007http://www.openwall.com/lists/oss-security/2015/05/20/1
8
9racoon/gssapi.c in IPsec-Tools 0.8.2 allows remote attackers to cause
10a denial of service (NULL pointer dereference and IKE daemon crash) via
11a series of crafted UDP requests.
12
13https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-4047
14
15Signed-off-by: Roy Li <rongqing.li@windriver.com>
16---
17 src/racoon/gssapi.c | 5 +++++
18 1 file changed, 5 insertions(+)
19
20diff --git a/src/racoon/gssapi.c b/src/racoon/gssapi.c
21index e64b201..1ad3b42 100644
22--- a/src/racoon/gssapi.c
23+++ b/src/racoon/gssapi.c
24@@ -192,6 +192,11 @@ gssapi_init(struct ph1handle *iph1)
25 gss_name_t princ, canon_princ;
26 OM_uint32 maj_stat, min_stat;
27
28+ if (iph1->rmconf == NULL) {
29+ plog(LLV_ERROR, LOCATION, NULL, "no remote config\n");
30+ return -1;
31+ }
32+
33 gps = racoon_calloc(1, sizeof (struct gssapi_ph1_state));
34 if (gps == NULL) {
35 plog(LLV_ERROR, LOCATION, NULL, "racoon_calloc failed\n");
36--
371.9.1
38