-
Evann DREUMONT authored
The aspa_check() uses as_path_getlen() to estimate the size of a buffer, which does not work for AS_SET segments, because as_path_getlen() returns length 1 for them regardless of their length. This may cause buffer overflow and crash. As AS_SET segments are not valid for ASPA verification, we can just handle them explicitly. See https://datatracker.ietf.org/doc/html/draft-ietf-sidrops-aspa-verification#section-6 Co-Authored-By:
Alarig <alarig@swordarmor.fr> Minor changes by committer.
Evann DREUMONT authoredThe aspa_check() uses as_path_getlen() to estimate the size of a buffer, which does not work for AS_SET segments, because as_path_getlen() returns length 1 for them regardless of their length. This may cause buffer overflow and crash. As AS_SET segments are not valid for ASPA verification, we can just handle them explicitly. See https://datatracker.ietf.org/doc/html/draft-ietf-sidrops-aspa-verification#section-6 Co-Authored-By:
Alarig <alarig@swordarmor.fr> Minor changes by committer.
Loading