URL: https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=854e49e68d2540b6d72f8203c5681c25567288e1
Submitter: Guy Harris (guy@xxxxxxxxxxxx)
Changed: branch: master-1.12
Repository: wireshark
Commits:
854e49e by Pascal Quantin (pascal.quantin@xxxxxxxxx):
airpdcap: ensure that buffer put on stack is big enough to hold the result of AirPDcapRsnaPwd2PskStep()
g1439eb6 changed AIRPDCAP_WPA_PSK_LEN from 64 bytes to 32 bytes, leading to a stack corruption in AirPDcapRsnaPwd2Psk() function
Change-Id: Ibf51f6749715055cd84906a144214ed44c85256b
Reviewed-on: https://code.wireshark.org/review/8358
Reviewed-by: Pascal Quantin <pascal.quantin@xxxxxxxxx>
(cherry picked from commit db3412051ff3e20526f2f4bbf11271da4d70ef56)
Reviewed-on: https://code.wireshark.org/review/12778
Reviewed-by: Guy Harris <guy@xxxxxxxxxxxx>
Actions performed:
from bac021c IEEE 802.11: 802.1X (WPA-EAP) rekeying support
adds 854e49e airpdcap: ensure that buffer put on stack is big enough to hold the result of AirPDcapRsnaPwd2PskStep()
Summary of changes:
epan/crypt/airpdcap.c | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)