Bug ID 749222: dname compression offset overflow causes bad compression pointer

Last Modified: Sep 13, 2023

Affected Product(s):
BIG-IP DNS(all modules)

Known Affected Versions:
12.1.0, 12.1.1, 12.1.2, 12.1.3, 12.1.3.1, 12.1.3.2, 12.1.3.3, 12.1.3.4, 12.1.3.5, 12.1.3.6, 12.1.3.7, 12.1.4, 12.1.4.1, 12.1.5, 12.1.5.1, 12.1.5.2, 12.1.5.3, 12.1.6, 13.0.0, 13.0.0 HF1, 13.0.0 HF2, 13.0.0 HF3, 13.0.1, 13.1.0, 13.1.0.1, 13.1.0.2, 13.1.0.3, 13.1.0.4, 13.1.0.5, 13.1.0.6, 13.1.0.7, 13.1.0.8, 13.1.1, 13.1.1.2, 13.1.1.3, 13.1.1.4, 14.0.0, 14.0.0.1, 14.0.0.2, 14.0.0.3, 14.0.0.4, 14.1.0, 14.1.0.1, 14.1.0.2, 14.1.0.3, 14.1.0.5

Fixed In:
15.0.0, 14.1.0.6, 14.0.0.5, 13.1.1.5

Opened: Nov 08, 2018

Severity: 3-Major

Symptoms

DNS requests receive error response: -- Got bad packet: bad compression pointer. -- Got bad packet: bad label type.

Impact

DNS response is malformed. Because the DNS record is corrupted, zone transfer fails.

Conditions

When the DNS response is large enough so that dname redirects to an offset larger than 0x3f ff.

Workaround

None.

Fix Information

dname compression offset overflow no longer causes bad compression pointer.

Behavior Change

Guides & references

K10134038: F5 Bug Tracker Filter Names and Tips