]> git.ipfire.org Git - thirdparty/strongswan.git/commit
charon-tkm: Validate DH public key to fix potential buffer overflow
authorTobias Brunner <tobias@strongswan.org>
Tue, 11 Jul 2023 10:12:25 +0000 (12:12 +0200)
committerTobias Brunner <tobias@strongswan.org>
Fri, 17 Nov 2023 16:24:34 +0000 (17:24 +0100)
commit96d793718955820dfe5e6d8aa6127a34795ae39e
tree6c4435cc934130be28789c7bfa5069bfa8a7c732
parent74ae71d2b8a53ad41f810cd14baca929a0af747d
charon-tkm: Validate DH public key to fix potential buffer overflow

Seems this was forgotten in the referenced commit and actually could lead
to a buffer overflow.  Since charon-tkm is untrusted this isn't that
much of an issue but could at least be easily exploited for a DoS attack
as DH public values are set when handling IKE_SA_INIT requests.

Fixes: 0356089d0f94 ("diffie-hellman: Verify public DH values in backends")
Fixes: CVE-2023-41913
src/charon-tkm/src/tkm/tkm_diffie_hellman.c