URL: https://code.wireshark.org/review/gitweb?p=wireshark.git;a=commit;h=9b0b20b8d5f8c9f7839d58ff6c5900f7e19283b4
Submitter: Anders Broman (a.broman58@xxxxxxxxx)
Changed: branch: master
Repository: wireshark
Commits:
9b0b20b by Michael Mann (mmann78@xxxxxxxxxxxx):
Make sure EAPOL body is big enough for a EAPOL_RSN_KEY.
A pointer to a EAPOL_RSN_KEY is set on the packet presuming the
whole EAPOL_RSN_KEY is there. That's not always the case for
fuzzed/malicious captures.
Bug: 11585
Change-Id: Ib94b8aceef444c7820e43b969596efdb8dbecccd
Reviewed-on: https://code.wireshark.org/review/15540
Reviewed-by: Michael Mann <mmann78@xxxxxxxxxxxx>
Petri-Dish: Michael Mann <mmann78@xxxxxxxxxxxx>
Tested-by: Petri Dish Buildbot <buildbot-no-reply@xxxxxxxxxxxxx>
Reviewed-by: Anders Broman <a.broman58@xxxxxxxxx>
Actions performed:
from b831f25 Include <sys/socket.h>, too.
adds 9b0b20b Make sure EAPOL body is big enough for a EAPOL_RSN_KEY.
Summary of changes:
epan/crypt/airpdcap.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)