Blame SOURCES/dhcp-CVE-2022-2929.patch

ce50bf
diff --git a/common/options.c b/common/options.c
ce50bf
index addc65a..3e6383a 100644
ce50bf
--- a/common/options.c
ce50bf
+++ b/common/options.c
ce50bf
@@ -435,16 +435,16 @@ int fqdn_universe_decode (struct option_state *options,
ce50bf
 		while (s < &bp -> data[0] + length + 2) {
ce50bf
 			len = *s;
ce50bf
 			if (len > 63) {
ce50bf
-				log_info ("fancy bits in fqdn option");
ce50bf
-				return 0;
ce50bf
+				log_info ("label length exceeds 63 in fqdn option");
ce50bf
+				goto bad;
ce50bf
 			}
ce50bf
 			if (len == 0) {
ce50bf
 				terminated = 1;
ce50bf
 				break;
ce50bf
 			}
ce50bf
 			if (s + len > &bp -> data [0] + length + 3) {
ce50bf
-				log_info ("fqdn tag longer than buffer");
ce50bf
-				return 0;
ce50bf
+				log_info ("fqdn label longer than buffer");
ce50bf
+				goto bad;
ce50bf
 			}
ce50bf
 
ce50bf
 			if (first_len == 0) {