aboutsummaryrefslogtreecommitdiffstats
path: root/src/p2p
diff options
context:
space:
mode:
authorJouni Malinen <jouni@qca.qualcomm.com>2014-04-09 13:02:53 +0300
committerDmitry Shmidt <dimitrysh@google.com>2014-04-10 10:24:52 -0700
commit26af48b2fcdee1b88e4092a9078cb7c9bf79da6e (patch)
tree53f08cf509fd8f0d1814832f903ec85d7085421f /src/p2p
parentf940fbdc849eba19de7b63a74ced85e550bf4572 (diff)
downloadandroid_external_wpa_supplicant_8-26af48b2fcdee1b88e4092a9078cb7c9bf79da6e.tar.gz
android_external_wpa_supplicant_8-26af48b2fcdee1b88e4092a9078cb7c9bf79da6e.tar.bz2
android_external_wpa_supplicant_8-26af48b2fcdee1b88e4092a9078cb7c9bf79da6e.zip
OpenSSL: Detect and prevent TLS heartbeat attack
Some OpenSSL versions have vulnerability in TLS heartbeat request processing. Check the processed message to determine if the attack has been used and if so, do not send the response to the peer. This does not prevent the buffer read overflow within OpenSSL, but this prevents the attacker from receiving the information. This change is an additional layer of protection if some yet to be identified paths were to expose this OpenSSL vulnerability. However, the way OpenSSL is used for EAP-TLS/TTLS/PEAP/FAST in hostapd/wpa_supplicant was already rejecting the messages before the response goes out and as such, this additional change is unlikely to be needed to avoid the issue. Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
Diffstat (limited to 'src/p2p')
0 files changed, 0 insertions, 0 deletions