diff options
author | Jouni Malinen <jouni@qca.qualcomm.com> | 2014-10-06 18:49:01 +0300 |
---|---|---|
committer | Wolfgang Wiedmeyer <wolfgit@wiedmeyer.de> | 2015-10-20 23:06:05 +0200 |
commit | a4451d093516b8810ee158c3989948422e290701 (patch) | |
tree | 5da235cade9b1413fef32fc23afd412cd3ed8ee3 /hostapd | |
parent | d5650a88d54239c7602c02e16d22f5e6e8bc6ae2 (diff) | |
download | external_wpa_supplicant_8_ti-a4451d093516b8810ee158c3989948422e290701.zip external_wpa_supplicant_8_ti-a4451d093516b8810ee158c3989948422e290701.tar.gz external_wpa_supplicant_8_ti-a4451d093516b8810ee158c3989948422e290701.tar.bz2 |
Use os_exec() to run the action script operations to avoid undesired
command line processing for control interface event strings. Previously,
it could have been possible for some of the event strings to include
unsanitized data which is not suitable for system() use. (CVE-2014-3686)
Change-Id: If46d6cfcb9d7fc9700965e818315e5aa50fa11a5
Signed-off-by: Jouni Malinen <jouni@qca.qualcomm.com>
Tested-by: Wolfgang Wiedmeyer <wolfgit@wiedmeyer.de>
Diffstat (limited to 'hostapd')
-rw-r--r-- | hostapd/hostapd_cli.c | 25 |
1 files changed, 8 insertions, 17 deletions
diff --git a/hostapd/hostapd_cli.c b/hostapd/hostapd_cli.c index f3fba3e..0c785a4 100644 --- a/hostapd/hostapd_cli.c +++ b/hostapd/hostapd_cli.c @@ -234,28 +234,19 @@ static int hostapd_cli_cmd_mib(struct wpa_ctrl *ctrl, int argc, char *argv[]) static int hostapd_cli_exec(const char *program, const char *arg1, const char *arg2) { - char *cmd; + char *arg; size_t len; int res; - int ret = 0; - len = os_strlen(program) + os_strlen(arg1) + os_strlen(arg2) + 3; - cmd = os_malloc(len); - if (cmd == NULL) + len = os_strlen(arg1) + os_strlen(arg2) + 2; + arg = os_malloc(len); + if (arg == NULL) return -1; - res = os_snprintf(cmd, len, "%s %s %s", program, arg1, arg2); - if (res < 0 || (size_t) res >= len) { - os_free(cmd); - return -1; - } - cmd[len - 1] = '\0'; -#ifndef _WIN32_WCE - if (system(cmd) < 0) - ret = -1; -#endif /* _WIN32_WCE */ - os_free(cmd); + os_snprintf(arg, len, "%s %s", arg1, arg2); + res = os_exec(program, arg, 1); + os_free(arg); - return ret; + return res; } |