From: Felix Fietkau Date: Wed, 17 Oct 2012 18:18:17 +0000 (+0000) Subject: hostapd: merge a security fix for a TLS message buffer overflow (CVE-2012-4445) X-Git-Url: http://git.lede-project.org./?a=commitdiff_plain;h=970b58823d20ee2a583a5de3b40e51247ef724ef;p=openwrt%2Fsvn-archive%2Farchive.git hostapd: merge a security fix for a TLS message buffer overflow (CVE-2012-4445) Backport of r33815 SVN-Revision: 33816 --- diff --git a/package/hostapd/patches/001-CVE-2012-4445.patch b/package/hostapd/patches/001-CVE-2012-4445.patch new file mode 100644 index 0000000000..1b8bdd00c5 --- /dev/null +++ b/package/hostapd/patches/001-CVE-2012-4445.patch @@ -0,0 +1,17 @@ +--- a/src/eap_server/eap_server_tls_common.c ++++ b/src/eap_server/eap_server_tls_common.c +@@ -228,6 +228,14 @@ static int eap_server_tls_process_fragme + return -1; + } + ++ if (len > message_length) { ++ wpa_printf(MSG_INFO, "SSL: Too much data (%d bytes) in " ++ "first fragment of frame (TLS Message " ++ "Length %d bytes)", ++ (int) len, (int) message_length); ++ return -1; ++ } ++ + data->tls_in = wpabuf_alloc(message_length); + if (data->tls_in == NULL) { + wpa_printf(MSG_DEBUG, "SSL: No memory for message");