Patch Detail
get:
Show a patch.
patch:
Update a patch.
put:
Update a patch.
GET /api/patches/810837/?format=api
{ "id": 810837, "url": "http://patchwork.ozlabs.org/api/patches/810837/?format=api", "web_url": "http://patchwork.ozlabs.org/project/lede/patch/1504753103-8907-1-git-send-email-ldir@darbyshire-bryant.me.uk/", "project": { "id": 54, "url": "http://patchwork.ozlabs.org/api/projects/54/?format=api", "name": "LEDE development", "link_name": "lede", "list_id": "lede-dev.lists.infradead.org", "list_email": "lede-dev@lists.infradead.org", "web_url": "http://lede-project.org/", "scm_url": "", "webscm_url": "http://git.lede-project.org/", "list_archive_url": "", "list_archive_url_format": "", "commit_url_format": "" }, "msgid": "<1504753103-8907-1-git-send-email-ldir@darbyshire-bryant.me.uk>", "list_archive_url": null, "date": "2017-09-07T02:58:23", "name": "[LEDE-DEV] dnsmasq: backport official fix for CVE-2017-13704", "commit_ref": null, "pull_url": null, "state": "accepted", "archived": false, "hash": "e43c7a40a656e09fb8ed02229fab4e7fae79f874", "submitter": { "id": 72287, "url": "http://patchwork.ozlabs.org/api/people/72287/?format=api", "name": "Kevin 'ldir' Darbyshire-Bryant", "email": "ldir@darbyshire-bryant.me.uk" }, "delegate": null, "mbox": "http://patchwork.ozlabs.org/project/lede/patch/1504753103-8907-1-git-send-email-ldir@darbyshire-bryant.me.uk/mbox/", "series": [ { "id": 1902, "url": "http://patchwork.ozlabs.org/api/series/1902/?format=api", "web_url": "http://patchwork.ozlabs.org/project/lede/list/?series=1902", "date": "2017-09-07T02:58:23", "name": "[LEDE-DEV] dnsmasq: backport official fix for CVE-2017-13704", "version": 1, "mbox": "http://patchwork.ozlabs.org/series/1902/mbox/" } ], "comments": "http://patchwork.ozlabs.org/api/patches/810837/comments/", "check": "pending", "checks": "http://patchwork.ozlabs.org/api/patches/810837/checks/", "tags": {}, "related": [], "headers": { "Return-Path": "<lede-dev-bounces+incoming=patchwork.ozlabs.org@lists.infradead.org>", "X-Original-To": "incoming@patchwork.ozlabs.org", "Delivered-To": "patchwork-incoming@bilbo.ozlabs.org", "Authentication-Results": [ "ozlabs.org; spf=none (mailfrom)\n\tsmtp.mailfrom=lists.infradead.org (client-ip=65.50.211.133;\n\thelo=bombadil.infradead.org;\n\tenvelope-from=lede-dev-bounces+incoming=patchwork.ozlabs.org@lists.infradead.org;\n\treceiver=<UNKNOWN>)", "ozlabs.org; dkim=pass (2048-bit key;\n\tunprotected) header.d=lists.infradead.org\n\theader.i=@lists.infradead.org header.b=\"bgybk162\"; \n\tdkim=fail reason=\"signature verification failed\" (1024-bit key;\n\tunprotected) header.d=darbyshire-bryant.me.uk\n\theader.i=@darbyshire-bryant.me.uk header.b=\"hIHc+4bH\"; \n\tdkim-atps=neutral", "spf=none (sender IP is )\n\tsmtp.mailfrom=kevin@darbyshire-bryant.me.uk; " ], "Received": [ "from bombadil.infradead.org (bombadil.infradead.org\n\t[65.50.211.133])\n\t(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256\n\tbits)) (No client certificate requested)\n\tby ozlabs.org (Postfix) with ESMTPS id 3xnlYF4y8Dz9rxm\n\tfor <incoming@patchwork.ozlabs.org>;\n\tThu, 7 Sep 2017 12:59:42 +1000 (AEST)", "from localhost ([127.0.0.1] helo=bombadil.infradead.org)\n\tby bombadil.infradead.org with esmtp (Exim 4.87 #1 (Red Hat Linux))\n\tid 1dpn2F-0003bK-Cl; Thu, 07 Sep 2017 02:59:19 +0000", "from mail-he1eur01on0064.outbound.protection.outlook.com\n\t([104.47.0.64] helo=EUR01-HE1-obe.outbound.protection.outlook.com)\n\tby bombadil.infradead.org with esmtps (Exim 4.87 #1 (Red Hat Linux))\n\tid 1dpn1o-0003Tw-IN\n\tfor lede-dev@lists.infradead.org; Thu, 07 Sep 2017 02:58:55 +0000", "from Animal.darbyshire-bryant.me.uk (2a02:c7f:1232:220::fb0e) by\n\tVI1PR07MB1039.eurprd07.prod.outlook.com (2a01:111:e400:5096::15) with\n\tMicrosoft SMTP Server (version=TLS1_2,\n\tcipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384_P256) id 15.20.35.3;\n\tThu, 7 Sep 2017 02:58:27 +0000" ], "DKIM-Signature": [ "v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;\n\td=lists.infradead.org; s=bombadil.20170209; h=Sender:\n\tContent-Transfer-Encoding:Content-Type:Cc:List-Subscribe:List-Help:List-Post:\n\tList-Archive:List-Unsubscribe:List-Id:Subject:MIME-Version:Message-Id:Date:To\n\t:From:Reply-To:Content-ID:Content-Description:Resent-Date:Resent-From:\n\tResent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:In-Reply-To:References:\n\tList-Owner; bh=BwN7EcGtaBFmdGd/F7RmPd8Gy5tVV5gY01+ALz27JCg=;\n\tb=bgybk1628sqKZg\n\tZknbytp/8xThTo1jxW+zn7CqqMmJ6aXMjr/6cs+8Mi+cnSQt2KZaVZ4OI3uaKqp/02bkd+WCskii8\n\tNDvRiHnStWx3KCJZBgBU3sYm0Jg8gmjlCfzJoSgCnU+5RQY24A0vKRNTYGa0GgfHHNrCbYLEKYdXR\n\tYr+9xYrQHaR/U7+wyExGhW97oZMZD60H8EZ2uiFIsd4lhgkXdGQjsSrF7GCuwOtAg4YlHv+rtyNPz\n\tBiUFBMfcoZNEEH4b0NqzeR3f1yt/oqA5Aqi4Vev9EtBdZ4TzoeMxndFYFY80HECcQ0ntAf4Q1CVnd\n\t2nIpqtHQd3HM31KzFB5Q==;", "v=1; a=rsa-sha256; c=relaxed/relaxed;\n\td=darbyshire-bryant.me.uk; s=selector1;\n\th=From:Date:Subject:Message-ID:Content-Type:MIME-Version;\n\tbh=mF4qU9Mqj+VlGqOh3caGlXpJ7QuN1FvPKTgtdiP+9G8=;\n\tb=hIHc+4bH++gviGzFw0w0RYiUl3ugKPUXAPjPndFfcp2We9vJ4Ee1Oe9qJP1FHDC7PdLurvFFdTRiL2mzVIHFC6bmuzzc2rgz639Lu0WHclzG6kgqfylO4+C1DPB2hhpsB/d8+o0P6bvhg0osHf3295fcmFEbXapyP/4hJULYf5Y=" ], "From": "Kevin Darbyshire-Bryant <ldir@darbyshire-bryant.me.uk>", "To": "lede-dev@lists.infradead.org", "Date": "Thu, 7 Sep 2017 03:58:23 +0100", "Message-Id": "<1504753103-8907-1-git-send-email-ldir@darbyshire-bryant.me.uk>", "X-Mailer": "git-send-email 2.7.4", "MIME-Version": "1.0", "X-Originating-IP": "[2a02:c7f:1232:220::fb0e]", "X-ClientProxiedBy": "DB6PR07CA0056.eurprd07.prod.outlook.com\n\t(2603:10a6:6:2a::18) To VI1PR07MB1039.eurprd07.prod.outlook.com\n\t(2a01:111:e400:5096::15)", "X-MS-PublicTrafficType": "Email", "X-MS-Office365-Filtering-Correlation-Id": "b342bf04-3faa-400b-210b-08d4f59c507f", "X-Microsoft-Antispam": "UriScan:; BCL:0; PCL:0;\n\tRULEID:(300000500095)(300135000095)(300000501095)(300135300095)(300000502095)(300135100095)(22001)(2017030254152)(2017082002075)(300000503095)(300135400095)(201703131423075)(201702281549075)(300000504095)(300135200095)(300000505095)(300135600095)(300000506095)(300135500095);\n\tSRVR:VI1PR07MB1039; ", "X-Microsoft-Exchange-Diagnostics": [ "1; VI1PR07MB1039;\n\t3:c2a+/8rI5BvmhaNyLcep7DHSuA8Vx/slD54dSG2dtixKD+psD0qxP+P+4IvGr2GgGm1fr6KC3YrCDcHdF8Rc7mqMyx9ePDJDo11FTnaFeTF3mxa2oK5i6hLpx/QfwmU7koIyRodtPy9mckzjFi6za4STlANaq7V9u0BM0L1AKnxdFjMh/sSYTvhAkiW6/682eBpFkQwlLujFZJ9aVjYM9ocFi/6Yb7zkEmrK2Piix79ctStG0vdYOXeWQoMPr03V;\n\t25:fLnC2GoUYhezFoeiM2Zze1FN7Dz5rU030tyoBgksMJOAlc4lCazbY74voc7ZlPnwZHIngv6F/CPKoFkYaSgDqVdJGq2GLC4n601xWWNgDq7PDWvntR8p440ACG438xmlJEWtXDmmGBjgAuiQ8TvFW5yAg7RiZRCHuDoDOl9kFPD6rapnt6t7O82UjQLnG89OIxldvNcYsm2R7AmIMPJuZcE3kpYTnUzq1gdSXfjiwQ0HTx6i3zb6qmPqJu8H1ujDq1q/XNB+5rtm59UITmKYb8ZbNSisaDd2MwurthgV3YqjXCp6YGq6ogGLMIz/G5EcidYi/ToEforF8gR0E6yLvw==;\n\t31:i1dBeKmIoIUZ5pz9A16u34dHMr2okG3jQNxQD43mzxl4/RoSIZ8cxJGIc3N5tppQfwI51icXuHKRpUpnnvwITWiL9XNOhrWso6vwUu5Ym+kXubmpyHVqjM1P4uSCdEbzeZ1x1YdWYGUGcYfWXDpmThMG8pzsQxomaUPa3exeNM9Iqv79tP06z6LN0V3A7t7S1fc3aJSU4oXdW2iafiWKx/DbitnsBmFoLSxeu4Xz6Q4=", "1; VI1PR07MB1039;\n\t4:qld5XohDWhxSczd73Lijz4iPvnIA5HCIuBNk+8KLgfeOcnxXLpK5sqROrPQJAWoHUyRo3CCC4qfLRnTuFnwmmvwkhZwh5tU9lioSbR0YsctNBfQ0lSRWZoih4yDcJrPDeoS4lYcWUHH55ZJLHJFxhXdYAKGNo6nnHbyO9fAhzEPLNzXUnQgFiJ61nMr6oyxkJofoIeLtrVfDKQlKg1FySk8bK5r4kUvCu4px7O53mp5NYVWoeg41QhUjvZpxjE4YXsepcnhi6UwoL17CrpMR7GdKdJfxYXHXEMEN0s/sFGQ=", "=?us-ascii?Q?1; VI1PR07MB1039;\n\t23:Ww3G6pyQxy5uRfdr/2x7wjjSmmPJIHbaB2ihy6gqN?=\n\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", "1; VI1PR07MB1039;\n\t6:A9W/2ikPjQYQFarjnhY057aJOT3QdLwssnJ9q+aMJfShtiGxrZRb8i48evmYtV/Pq3J18kenb/wVZxsT6oLRu1riV8m/roAMlYCH5XdDd2MLQPyrgGpHKPVy2fRd1WOaH/Eq+arOVY/a/vSNtlCJCKr4HcsRpJ0xPMYnhZ5Fng0SdhYJhF8ge7BFher3aL7xVwBJWOSkayZfmbCPj5vwsf+msJSpM6K9pPU8slaf02CoTArIxGUQctHgDb0AdZBE+baCjXJhmYFutIWbCJF6EefL3yoeNvz+rw0RJ9dzdWM3KJRXEbe8yBtEHxUJqrNsE5ADmocHcp63orzae5WtyA==;\n\t5:NsRBkfYgHRBS1eq77iT13pO5epqMxCfgbjAEOzzHmp0LFzWo/aYMYPB4ZUohCFpJs2D8lm2Ego1PC/GpDVBraoiDJ4tUbQFEQcIIbiViADPDnHKDWFq62Nb5G0P9GXFtUwEDQJ2sekYDT2hhBahsfQ==;\n\t24:2lljZwzHNC2vJa2aOVpFAK715iVsr5fL7jp9MgOUGzG9X82uiefUPbiphRZR2+TqSQrEXkNFzJ5Dc+2KavLthFB1bpgRjJxDVcwKtD91oGw=;\n\t7:x7KQUeX60j6xQc6DzuoPjk7RCgOU+lUrn5J7BPGcvko9q8pCuqA0ufcUJiEwDgEux+oyFML2yZHPOlxQJErhQzkC4w498v8SAtD1egXQTXOnDEUqjTKu/b7zgoyHJg91N3h0g8PuZifd1iUfOOJb2AC0sy1/pzhmkdNkkePbGSfLxI0XpdXlo/TOJ3h083jbLrmRTXLrcOcrXuz5EfV9Mi/r0x3yfr3T8z8PAK2kHyA=" ], "X-MS-TrafficTypeDiagnostic": "VI1PR07MB1039:", "X-Exchange-Antispam-Report-Test": "UriScan:(192374486261705);", "X-Microsoft-Antispam-PRVS": "<VI1PR07MB10396C7888EC25319E9EDAF4A5940@VI1PR07MB1039.eurprd07.prod.outlook.com>", "X-Exchange-Antispam-Report-CFA-Test": "BCL:0; PCL:0;\n\tRULEID:(100000700101)(100105000095)(100000701101)(100105300095)(100000702101)(100105100095)(6040450)(2401047)(8121501046)(5005006)(93006095)(93001095)(3002001)(10201501046)(100000703101)(100105400095)(6041248)(20161123560025)(201703131423075)(201702281528075)(201703061421075)(201703061406153)(20161123564025)(20161123562025)(20161123558100)(20161123555025)(2016111802025)(6043046)(6072148)(201708071742011)(100000704101)(100105200095)(100000705101)(100105500095);\n\tSRVR:VI1PR07MB1039; BCL:0; PCL:0;\n\tRULEID:(100000800101)(100110000095)(100000801101)(100110300095)(100000802101)(100110100095)(100000803101)(100110400095)(100000804101)(100110200095)(100000805101)(100110500095);\n\tSRVR:VI1PR07MB1039; ", "X-Forefront-PRVS": "04238CD941", "X-Forefront-Antispam-Report": "SFV:NSPM;\n\tSFS:(10009020)(4630300001)(7370300001)(6009001)(39830400002)(189002)(199003)(54534003)(47776003)(48376002)(36756003)(50986999)(575784001)(50466002)(74482002)(189998001)(53416004)(81156014)(81166006)(106356001)(50226002)(105586002)(101416001)(7736002)(5003940100001)(42186005)(305945005)(8676002)(230783001)(6116002)(97736004)(2351001)(2361001)(478600001)(33646002)(2906002)(42882006)(6916009)(69596002)(6666003)(5660300001)(4326008)(68736007)(25786009)(110136004)(6486002)(107886003)(7350300001)(53936002);\n\tDIR:OUT; SFP:1101; SCL:1; SRVR:VI1PR07MB1039;\n\tH:Animal.darbyshire-bryant.me.uk; \n\tFPR:; SPF:None; PTR:InfoNoRecords; MX:1; A:1; LANG:en; ", "Received-SPF": "None (protection.outlook.com: darbyshire-bryant.me.uk does not\n\tdesignate permitted sender hosts)", "SpamDiagnosticOutput": "1:99", "SpamDiagnosticMetadata": "NSPM", "X-OriginatorOrg": "darbyshire-bryant.me.uk", "X-MS-Exchange-CrossTenant-OriginalArrivalTime": "07 Sep 2017 02:58:27.7950\n\t(UTC)", "X-MS-Exchange-CrossTenant-FromEntityHeader": "Hosted", "X-MS-Exchange-Transport-CrossTenantHeadersStamped": "VI1PR07MB1039", "X-CRM114-Version": "20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 ", "X-CRM114-CacheID": "sfid-20170906_195853_062194_93E07AD4 ", "X-CRM114-Status": "GOOD ( 15.21 )", "X-Spam-Score": "-2.0 (--)", "X-Spam-Report": "SpamAssassin version 3.4.1 on bombadil.infradead.org summary:\n\tContent analysis details: (-2.0 points)\n\tpts rule name description\n\t---- ----------------------\n\t--------------------------------------------------\n\t-0.0 RCVD_IN_DNSWL_NONE RBL: Sender listed at http://www.dnswl.org/,\n\tno trust [104.47.0.64 listed in list.dnswl.org]\n\t-0.0 RCVD_IN_MSPIKE_H4 RBL: Very Good reputation (+4)\n\t[104.47.0.64 listed in wl.mailspike.net]\n\t-0.0 SPF_PASS SPF: sender matches SPF record\n\t-0.0 SPF_HELO_PASS SPF: HELO matches SPF record\n\t-1.9 BAYES_00 BODY: Bayes spam probability is 0 to 1%\n\t[score: 0.0000]\n\t-0.1 DKIM_VALID Message has at least one valid DKIM or DK signature\n\t0.1 DKIM_SIGNED Message has a DKIM or DK signature,\n\tnot necessarily valid\n\t-0.1 DKIM_VALID_AU Message has a valid DKIM or DK signature from\n\tauthor's\n\tdomain -0.0 RCVD_IN_MSPIKE_WL Mailspike good senders", "Subject": "[LEDE-DEV] [PATCH] dnsmasq: backport official fix for CVE-2017-13704", "X-BeenThere": "lede-dev@lists.infradead.org", "X-Mailman-Version": "2.1.21", "Precedence": "list", "List-Id": "<lede-dev.lists.infradead.org>", "List-Unsubscribe": "<http://lists.infradead.org/mailman/options/lede-dev>,\n\t<mailto:lede-dev-request@lists.infradead.org?subject=unsubscribe>", "List-Archive": "<http://lists.infradead.org/pipermail/lede-dev/>", "List-Post": "<mailto:lede-dev@lists.infradead.org>", "List-Help": "<mailto:lede-dev-request@lists.infradead.org?subject=help>", "List-Subscribe": "<http://lists.infradead.org/mailman/listinfo/lede-dev>,\n\t<mailto:lede-dev-request@lists.infradead.org?subject=subscribe>", "Cc": "Kevin Darbyshire-Bryant <ldir@darbyshire-bryant.me.uk>", "Content-Type": "text/plain; charset=\"us-ascii\"", "Content-Transfer-Encoding": "7bit", "Sender": "\"Lede-dev\" <lede-dev-bounces@lists.infradead.org>", "Errors-To": "lede-dev-bounces+incoming=patchwork.ozlabs.org@lists.infradead.org" }, "content": "Remove LEDE partial fix for CVE-2017-13704.\n\nBackport official fix from upstream.\n\nSigned-off-by: Kevin Darbyshire-Bryant <ldir@darbyshire-bryant.me.uk>\n---\nPlease cherrypick to LEDE 17.01\n\n .../patches/025-backport-fix-CVE-2017-13704.patch | 94 ++++++++++++++++++++++\n .../dnsmasq/patches/025-fix-CVE-2017-13704.patch | 37 ---------\n 2 files changed, 94 insertions(+), 37 deletions(-)\n create mode 100644 package/network/services/dnsmasq/patches/025-backport-fix-CVE-2017-13704.patch\n delete mode 100644 package/network/services/dnsmasq/patches/025-fix-CVE-2017-13704.patch", "diff": "diff --git a/package/network/services/dnsmasq/patches/025-backport-fix-CVE-2017-13704.patch b/package/network/services/dnsmasq/patches/025-backport-fix-CVE-2017-13704.patch\nnew file mode 100644\nindex 0000000..bba9a08\n--- /dev/null\n+++ b/package/network/services/dnsmasq/patches/025-backport-fix-CVE-2017-13704.patch\n@@ -0,0 +1,94 @@\n+From 63437ffbb58837b214b4b92cb1c54bc5f3279928 Mon Sep 17 00:00:00 2001\n+From: Simon Kelley <simon@thekelleys.org.uk>\n+Date: Wed, 6 Sep 2017 22:34:21 +0100\n+Subject: [PATCH] Fix CVE-2017-13704, which resulted in a crash on a large DNS\n+ query.\n+\n+A DNS query recieved by UDP which exceeds 512 bytes (or the EDNS0 packet size,\n+if different.) is enough to cause SIGSEGV.\n+---\n+ CHANGELOG | 7 +++++++\n+ src/auth.c | 5 -----\n+ src/forward.c | 8 ++++++++\n+ src/rfc1035.c | 5 -----\n+ 4 files changed, 15 insertions(+), 10 deletions(-)\n+\n+diff --git a/CHANGELOG b/CHANGELOG\n+index 3a640f3..7e65912 100644\n+--- a/CHANGELOG\n++++ b/CHANGELOG\n+@@ -17,6 +17,13 @@ version 2.78\n+ \t--strict-order active. Thanks to Hans Dedecker\n+ \tfor the patch\n+ \n++\tFix regression in 2.77, ironically added as a security\n++\timprovement, which resulted in a crash when a DNS\n++\tquery exceeded 512 bytes (or the EDNS0 packet size,\n++\tif different.) Thanks to Christian Kujau, Arne Woerner\n++\tJuan Manuel Fernandez and Kevin Darbyshire-Bryant for\n++\tchasing this one down. CVE-2017-13704 applies.\n++\n+ \t\n+ version 2.77\n+ \tGenerate an error when configured with a CNAME loop,\n+diff --git a/src/auth.c b/src/auth.c\n+index 2c24e16..7f95f98 100644\n+--- a/src/auth.c\n++++ b/src/auth.c\n+@@ -119,11 +119,6 @@ size_t answer_auth(struct dns_header *header, char *limit, size_t qlen, time_t n\n+ struct cname *a, *candidate;\n+ unsigned int wclen;\n+ \n+- /* Clear buffer beyond request to avoid risk of\n+- information disclosure. */\n+- memset(((char *)header) + qlen, 0, \n+-\t (limit - ((char *)header)) - qlen);\n+- \n+ if (ntohs(header->qdcount) == 0 || OPCODE(header) != QUERY )\n+ return 0;\n+ \n+diff --git a/src/forward.c b/src/forward.c\n+index f22556a..e3fa94b 100644\n+--- a/src/forward.c\n++++ b/src/forward.c\n+@@ -1188,6 +1188,10 @@ void receive_query(struct listener *listen, time_t now)\n+ (msg.msg_flags & MSG_TRUNC) ||\n+ (header->hb3 & HB3_QR))\n+ return;\n++\n++ /* Clear buffer beyond request to avoid risk of\n++ information disclosure. */\n++ memset(daemon->packet + n, 0, daemon->edns_pktsz - n);\n+ \n+ source_addr.sa.sa_family = listen->family;\n+ \n+@@ -1688,6 +1692,10 @@ unsigned char *tcp_request(int confd, time_t now,\n+ \n+ if (size < (int)sizeof(struct dns_header))\n+ \tcontinue;\n++\n++ /* Clear buffer beyond request to avoid risk of\n++\t information disclosure. */\n++ memset(payload + size, 0, 65536 - size);\n+ \n+ query_count++;\n+ \n+diff --git a/src/rfc1035.c b/src/rfc1035.c\n+index 26f5301..af2fe46 100644\n+--- a/src/rfc1035.c\n++++ b/src/rfc1035.c\n+@@ -1223,11 +1223,6 @@ size_t answer_request(struct dns_header *header, char *limit, size_t qlen,\n+ struct mx_srv_record *rec;\n+ size_t len;\n+ \n+- /* Clear buffer beyond request to avoid risk of\n+- information disclosure. */\n+- memset(((char *)header) + qlen, 0, \n+-\t (limit - ((char *)header)) - qlen);\n+- \n+ if (ntohs(header->ancount) != 0 ||\n+ ntohs(header->nscount) != 0 ||\n+ ntohs(header->qdcount) == 0 || \n+-- \n+1.7.10.4\n+\ndiff --git a/package/network/services/dnsmasq/patches/025-fix-CVE-2017-13704.patch b/package/network/services/dnsmasq/patches/025-fix-CVE-2017-13704.patch\ndeleted file mode 100644\nindex 8848131..0000000\n--- a/package/network/services/dnsmasq/patches/025-fix-CVE-2017-13704.patch\n+++ /dev/null\n@@ -1,37 +0,0 @@\n-From 38af9b1ac3242a4128e88069c495024caa565f0e Mon Sep 17 00:00:00 2001\n-From: Kevin Darbyshire-Bryant <kevin@darbyshire-bryant.me.uk>\n-Date: Tue, 29 Aug 2017 12:35:40 +0100\n-Subject: [PATCH] forward.c: fix CVE-2017-13704\n-\n-Fix SIGSEGV in rfc1035.c answer_request() line 1228 where memset()\n-is called with header & limit pointing at the same address and thus\n-tries to clear memory from before the buffer begins.\n-\n-answer_request() is called with an invalid edns packet size provided by\n-the client. Ensure the udp_size provided by the client is bounded by\n-512 and configured maximum as per RFC 6891 6.2.3 \"Values lower than 512\n-MUST be treated as equal to 512\"\n-\n-The client that exposed the problem provided a payload udp size of 0.\n-\n-Signed-off-by: Kevin Darbyshire-Bryant <kevin@darbyshire-bryant.me.uk>\n----\n- src/forward.c | 2 ++\n- 1 file changed, 2 insertions(+)\n-\n-diff --git a/src/forward.c b/src/forward.c\n-index f22556a..62c5a5a 100644\n---- a/src/forward.c\n-+++ b/src/forward.c\n-@@ -1408,6 +1408,8 @@ void receive_query(struct listener *listen, time_t now)\n- \t defaults to 512 */\n- if (udp_size > daemon->edns_pktsz)\n- \tudp_size = daemon->edns_pktsz;\n-+ if (udp_size < 512)\n-+\tudp_size = 512; /* RFC 6891 6.2.3 */\n- }\n- \n- #ifdef HAVE_AUTH\n--- \n-2.7.4\n-\n", "prefixes": [ "LEDE-DEV" ] }