mirror of https://github.com/hak5/openwrt.git
hostapd: merge a security fix for a TLS message buffer overflow (CVE-2012-4445)
SVN-Revision: 33815lede-17.01
parent
c6ba19c70e
commit
26944502e3
|
@ -0,0 +1,17 @@
|
||||||
|
--- a/src/eap_server/eap_server_tls_common.c
|
||||||
|
+++ b/src/eap_server/eap_server_tls_common.c
|
||||||
|
@@ -228,6 +228,14 @@ static int eap_server_tls_process_fragme
|
||||||
|
return -1;
|
||||||
|
}
|
||||||
|
|
||||||
|
+ if (len > message_length) {
|
||||||
|
+ wpa_printf(MSG_INFO, "SSL: Too much data (%d bytes) in "
|
||||||
|
+ "first fragment of frame (TLS Message "
|
||||||
|
+ "Length %d bytes)",
|
||||||
|
+ (int) len, (int) message_length);
|
||||||
|
+ return -1;
|
||||||
|
+ }
|
||||||
|
+
|
||||||
|
data->tls_in = wpabuf_alloc(message_length);
|
||||||
|
if (data->tls_in == NULL) {
|
||||||
|
wpa_printf(MSG_DEBUG, "SSL: No memory for message");
|
Loading…
Reference in New Issue