1
0
mirror of https://github.com/RIOT-OS/RIOT.git synced 2024-12-29 04:50:03 +01:00
RIOT/sys/net/application_layer/asymcute
Sören Tempel 06d572c2fc asymcute: fix one byte out-of-bounds access in _len_get
As per Section 5.2.1 of the MQTT-SN specification, the MQTT-SN length
header is either 1- or 3-octet long. If it is 3-octet long then the
first octet is 0x01. The asymcute implementation currently only checks
that the incoming packet is at least 2-octet long before attempting to
parse it (MIN_PKT_LEN). However, if the first octet is 0x01 the packet
must be more than 3 octet long in order to be valid. Since asymcute
does not check this it reads one octet beyond the packet data for a
2-octet packet where the first octet has the value 0x01. This commit
fixes this issue by adding an additional sanity check to _len_get.
2022-08-10 05:41:10 +02:00
..
asymcute.c asymcute: fix one byte out-of-bounds access in _len_get 2022-08-10 05:41:10 +02:00
Kconfig net/asymcute : Move 'ASYMCUTE_BUFSIZE' to 'CONFIG_' 2020-11-19 23:11:21 +01:00
Makefile net: add Asymcute (asynchronous MQTT-SN client) 2018-07-05 15:44:16 +02:00