hostapd: merge a security fix for a TLS message buffer overflow (CVE-2012-4445)

git-svn-id: svn://svn.openwrt.org/openwrt/trunk@33815 3c298f89-4303-0410-b956-a3cf2f4a3e73
master
Felix Fietkau 2012-10-17 18:16:56 +00:00
parent 9afeebbea7
commit 10e391acb0
1 changed files with 17 additions and 0 deletions

View File

@ -0,0 +1,17 @@
--- a/src/eap_server/eap_server_tls_common.c
+++ b/src/eap_server/eap_server_tls_common.c
@@ -228,6 +228,14 @@ static int eap_server_tls_process_fragme
return -1;
}
+ if (len > message_length) {
+ wpa_printf(MSG_INFO, "SSL: Too much data (%d bytes) in "
+ "first fragment of frame (TLS Message "
+ "Length %d bytes)",
+ (int) len, (int) message_length);
+ return -1;
+ }
+
data->tls_in = wpabuf_alloc(message_length);
if (data->tls_in == NULL) {
wpa_printf(MSG_DEBUG, "SSL: No memory for message");