mirror of
https://github.com/espressif/esp-idf.git
synced 2025-07-29 18:27:20 +02:00
Merge branch 'bugfix/sae_h2e_vulnerability_fix_v5.0' into 'release/v5.0'
fix(wifi): Sae check for invalid rejected group (v5.0) See merge request espressif/esp-idf!33982
This commit is contained in:
@ -172,6 +172,60 @@ static u8 *wpa3_build_sae_msg(u8 *bssid, u32 sae_msg_type, size_t *sae_msg_len)
|
||||
return buf;
|
||||
}
|
||||
|
||||
static int wpa3_sae_is_group_enabled(int group)
|
||||
{
|
||||
int *groups = NULL;
|
||||
int default_groups[] = { 19, 0 };
|
||||
int i;
|
||||
|
||||
if (!groups) {
|
||||
groups = default_groups;
|
||||
}
|
||||
|
||||
for (i = 0; groups[i] > 0; i++) {
|
||||
if (groups[i] == group) {
|
||||
return 1;
|
||||
}
|
||||
}
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
static int wpa3_check_sae_rejected_groups(const struct wpabuf *groups)
|
||||
{
|
||||
size_t i, count, len;
|
||||
const u8 *pos;
|
||||
|
||||
if (!groups) {
|
||||
return 0;
|
||||
}
|
||||
|
||||
pos = wpabuf_head(groups);
|
||||
len = wpabuf_len(groups);
|
||||
if (len & 1) {
|
||||
wpa_printf(MSG_DEBUG,
|
||||
"SAE: Invalid length of the Rejected Groups element payload: %zu",
|
||||
len);
|
||||
return 1;
|
||||
}
|
||||
count = len / 2;
|
||||
for (i = 0; i < count; i++) {
|
||||
int enabled;
|
||||
u16 group;
|
||||
|
||||
group = WPA_GET_LE16(pos);
|
||||
pos += 2;
|
||||
enabled = wpa3_sae_is_group_enabled(group);
|
||||
wpa_printf(MSG_DEBUG, "SAE: Rejected group %u is %s",
|
||||
group, enabled ? "enabled" : "disabled");
|
||||
if (enabled) {
|
||||
return 1;
|
||||
}
|
||||
}
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
static int wpa3_parse_sae_commit(u8 *buf, u32 len, u16 status)
|
||||
{
|
||||
int ret;
|
||||
@ -208,6 +262,9 @@ static int wpa3_parse_sae_commit(u8 *buf, u32 len, u16 status)
|
||||
wpa_printf(MSG_ERROR, "wpa3: could not parse commit(%d)", ret);
|
||||
return ret;
|
||||
}
|
||||
if (g_sae_data.tmp && wpa3_check_sae_rejected_groups(g_sae_data.tmp->peer_rejected_groups)) {
|
||||
return -1;
|
||||
}
|
||||
|
||||
ret = sae_process_commit(&g_sae_data);
|
||||
if (ret) {
|
||||
|
@ -2025,8 +2025,11 @@ static int sae_parse_rejected_groups(struct sae_data *sae,
|
||||
|
||||
wpa_hexdump(MSG_DEBUG, "SAE: Possible elements at the end of the frame",
|
||||
*pos, end - *pos);
|
||||
if (!sae_is_rejected_groups_elem(*pos, end))
|
||||
if (!sae_is_rejected_groups_elem(*pos, end)) {
|
||||
wpabuf_free(sae->tmp->peer_rejected_groups);
|
||||
sae->tmp->peer_rejected_groups = NULL;
|
||||
return WLAN_STATUS_SUCCESS;
|
||||
}
|
||||
|
||||
epos = *pos;
|
||||
epos++; /* skip IE type */
|
||||
@ -2036,6 +2039,12 @@ static int sae_parse_rejected_groups(struct sae_data *sae,
|
||||
epos++; /* skip ext ID */
|
||||
len--;
|
||||
|
||||
if (len & 1) {
|
||||
wpa_printf(MSG_DEBUG,
|
||||
"SAE: Invalid length of the Rejected Groups element payload: %u",
|
||||
len);
|
||||
return WLAN_STATUS_UNSPECIFIED_FAILURE;
|
||||
}
|
||||
wpabuf_free(sae->tmp->peer_rejected_groups);
|
||||
sae->tmp->peer_rejected_groups = wpabuf_alloc(len);
|
||||
if (!sae->tmp->peer_rejected_groups)
|
||||
@ -2086,6 +2095,9 @@ u16 sae_parse_commit(struct sae_data *sae, const u8 *data, size_t len,
|
||||
res = sae_parse_rejected_groups(sae, &pos, end);
|
||||
if (res != WLAN_STATUS_SUCCESS)
|
||||
return res;
|
||||
} else {
|
||||
wpabuf_free(sae->tmp->peer_rejected_groups);
|
||||
sae->tmp->peer_rejected_groups = NULL;
|
||||
}
|
||||
|
||||
/* Optional Anti-Clogging Token Container element */
|
||||
|
Reference in New Issue
Block a user