[Bug 138873] Re: "*** stack smashing detected ***: /sbin/wpa_supplicant terminated" with iwl4965
j at w1.fi
Tue Sep 25 22:59:01 EDT 2007
On Sat, Sep 15, 2007 at 09:18:24AM +0200, Reinhard Tartler wrote:
> Kees Cook <kees at ubuntu.com> writes:
> > * Add debian/patches/90_fix_wext_tsf_stack_overflow.dpatch: correct
> > buffer size limit on hexstr2bin call from wext_get_scan_custom
> > (LP: #138873).
> The file debian/patches/90_fix_wext_tsf_stack_overflow.dpatch has the
> following contents:
> diff -urNad wpasupplicant-0.6.0~/src/drivers/driver_wext.c wpasupplicant-0.6.0/src/drivers/driver_wext.c
> + bytes /= 2;
> hexstr2bin(spos, bin, bytes);
> Can you please comment on it?
This is a correct fix and I've applied it to my git tree. As far as the
buffer overflow is concerned, I'm actually surprised to see that it can
even be hit since this would require the driver to pass an invalid tsf=
custom iwevent in scan results..
Jouni Malinen PGP id EFC895FA
More information about the HostAP