diff options
author | Felix Fietkau <nbd@openwrt.org> | 2007-05-13 16:24:11 +0000 |
---|---|---|
committer | Felix Fietkau <nbd@openwrt.org> | 2007-05-13 16:24:11 +0000 |
commit | b910cf91f636873485856bc13e4b2a7074437639 (patch) | |
tree | cd2edc843f02dd199da0f97967a2816ef32d57c0 /package/madwifi/patches/105-security_patch_fix.patch | |
parent | cfcf4aab45e977827f09113b526fd94a6662a9c1 (diff) | |
download | upstream-b910cf91f636873485856bc13e4b2a7074437639.tar.gz upstream-b910cf91f636873485856bc13e4b2a7074437639.tar.bz2 upstream-b910cf91f636873485856bc13e4b2a7074437639.zip |
huge madwifi update - use a madwifi-ng-refcount snapshot as base, includes lots of bugfixes and performance enhancements
SVN-Revision: 7211
Diffstat (limited to 'package/madwifi/patches/105-security_patch_fix.patch')
-rw-r--r-- | package/madwifi/patches/105-security_patch_fix.patch | 27 |
1 files changed, 0 insertions, 27 deletions
diff --git a/package/madwifi/patches/105-security_patch_fix.patch b/package/madwifi/patches/105-security_patch_fix.patch deleted file mode 100644 index 96dc17ac60..0000000000 --- a/package/madwifi/patches/105-security_patch_fix.patch +++ /dev/null @@ -1,27 +0,0 @@ -The fix for CVE-2006-6332 in r1842 was not entirely correct. In -encode_ie() the bound check did not consider that each byte from -the IE causes two bytes to be written into buffer. That could -lead to a kernel oops, but does not allow code injection. This is -now fixed. - -Due to the type of this problem it does not trigger another -urgent security bugfix release. v0.9.3 is at the door anyway. - -Reported-by: Joachim Gleisner <jg@suse.de> - -Index: trunk/net80211/ieee80211_wireless.c -=================================================================== ---- trunk/net80211/ieee80211_wireless.c (revision 1846) -+++ trunk/net80211/ieee80211_wireless.c (revision 1847) -@@ -1566,8 +1566,8 @@ - bufsize -= leader_len; - p += leader_len; -- if (bufsize < ielen) -- return 0; -- for (i = 0; i < ielen && bufsize > 2; i++) -+ for (i = 0; i < ielen && bufsize > 2; i++) { - p += sprintf(p, "%02x", ie[i]); -+ bufsize -= 2; -+ } - return (i == ielen ? p - (u_int8_t *)buf : 0); - } |