fragattacks/src/rsn_supp
Jouni Malinen b7c61c9d4e Fix validation of EAPOL-Key length with AES key wrap (CID 62859)
The additional eight octet field was removed from keydatalen without
proper validation of the Key Data Length field. It would have been
possible for an invalid EAPOL-Key frame to be processed in a way that
ends up reading beyond the buffer. In theory, this could have also
resulted in writing beyond the EAPOL-Key frame buffer, but that is
unlikely to be feasible due to the AES key wrap validation step on
arbitrary memory contents.

Signed-off-by: Jouni Malinen <j@w1.fi>
2014-06-14 00:20:04 +03:00
..
Makefile Add CONFIG_CODE_COVERAGE=y option for gcov 2013-11-24 19:16:12 +02:00
peerkey.c Remove used KDE addition code from EAPOL-Key msg 4/4 2014-04-05 23:30:16 +03:00
peerkey.h rsn_supp: Do not track expiration time 2013-12-24 07:33:25 +02:00
pmksa_cache.c rsn_supp: Use monotonic time for PMKSA cache expiry 2013-12-24 07:50:26 +02:00
pmksa_cache.h Remove CONFIG_NO_WPA2 build parameter 2013-06-07 20:13:25 +03:00
preauth.c Skip network disabling on expected EAP failure 2014-01-08 16:42:15 +02:00
preauth.h Remove CONFIG_NO_WPA2 build parameter 2013-06-07 20:13:25 +03:00
tdls.c TDLS: Add extra validation step for responder RSN IE length 2014-06-07 19:21:48 +03:00
wpa_ft.c Enable FT with SAE 2013-12-29 10:00:31 +02:00
wpa_i.h Remove used KDE addition code from EAPOL-Key msg 4/4 2014-04-05 23:30:16 +03:00
wpa_ie.c Allow management group cipher to be configured 2014-03-14 21:58:45 +02:00
wpa_ie.h TDLS: Use QoS info from WMM IE obtained in TDLS frames 2014-03-12 22:39:11 +02:00
wpa.c Fix validation of EAPOL-Key length with AES key wrap (CID 62859) 2014-06-14 00:20:04 +03:00
wpa.h TDLS: Make wpa_tdls_send_teardown() static 2014-04-29 18:59:12 +03:00