mirror of
https://github.com/yuzu-emu/mbedtls.git
synced 2025-02-01 18:31:08 +00:00
Fix stack buffer overflow in net functions with large file descriptor
Fix a stack buffer overflow with mbedtls_net_recv_timeout() when given a file descriptor that is beyond FD_SETSIZE. The bug was due to not checking that the file descriptor is within the range of an fd_set object. Fix #4169 Signed-off-by: Gilles Peskine <Gilles.Peskine@arm.com>
This commit is contained in:
parent
9c1ae18c9c
commit
33d816aff9
3
ChangeLog.d/net_poll-fd_setsize.txt
Normal file
3
ChangeLog.d/net_poll-fd_setsize.txt
Normal file
|
@ -0,0 +1,3 @@
|
||||||
|
Security
|
||||||
|
* Fix a stack buffer overflow with mbedtls_net_recv_timeout() when given a
|
||||||
|
file descriptor that is beyond FD_SETSIZE. Reported by FigBug in #4169.
|
|
@ -535,6 +535,13 @@ int mbedtls_net_recv_timeout( void *ctx, unsigned char *buf, size_t len,
|
||||||
if( fd < 0 )
|
if( fd < 0 )
|
||||||
return( MBEDTLS_ERR_NET_INVALID_CONTEXT );
|
return( MBEDTLS_ERR_NET_INVALID_CONTEXT );
|
||||||
|
|
||||||
|
/* A limitation of select() is that it only works with file descriptors
|
||||||
|
* up to FD_SETSIZE. This is a limitation of the fd_set type. Error out
|
||||||
|
* early, because attempting to call FD_SET on a large file descriptor
|
||||||
|
* is a buffer overflow on typical platforms. */
|
||||||
|
if( fd >= FD_SETSIZE )
|
||||||
|
return( MBEDTLS_ERR_NET_RECV_FAILED );
|
||||||
|
|
||||||
FD_ZERO( &read_fds );
|
FD_ZERO( &read_fds );
|
||||||
FD_SET( fd, &read_fds );
|
FD_SET( fd, &read_fds );
|
||||||
|
|
||||||
|
|
Loading…
Reference in a new issue