Просмотр исходного кода

hostapd: merge a security fix for a TLS message buffer overflow (CVE-2012-4445)

SVN-Revision: 33815
Felix Fietkau 13 лет назад
Родитель
Сommit
26944502e3
1 измененных файлов с 17 добавлено и 0 удалено
  1. 17 0
      package/network/services/hostapd/patches/001-CVE-2012-4445.patch

+ 17 - 0
package/network/services/hostapd/patches/001-CVE-2012-4445.patch

@@ -0,0 +1,17 @@
+--- a/src/eap_server/eap_server_tls_common.c
++++ b/src/eap_server/eap_server_tls_common.c
+@@ -228,6 +228,14 @@ static int eap_server_tls_process_fragme
+ 			return -1;
+ 		}
+ 
++		if (len > message_length) {
++			wpa_printf(MSG_INFO, "SSL: Too much data (%d bytes) in "
++				   "first fragment of frame (TLS Message "
++				   "Length %d bytes)",
++				   (int) len, (int) message_length);
++			return -1;
++		}
++
+ 		data->tls_in = wpabuf_alloc(message_length);
+ 		if (data->tls_in == NULL) {
+ 			wpa_printf(MSG_DEBUG, "SSL: No memory for message");