1. 19 Nov, 2012 8 commits
  2. 18 Nov, 2012 1 commit
  3. 16 Nov, 2012 4 commits
  4. 14 Nov, 2012 5 commits
  5. 13 Nov, 2012 1 commit
  6. 12 Nov, 2012 1 commit
  7. 10 Nov, 2012 1 commit
  8. 09 Nov, 2012 7 commits
  9. 07 Nov, 2012 1 commit
  10. 05 Nov, 2012 2 commits
  11. 31 Oct, 2012 2 commits
  12. 30 Oct, 2012 2 commits
  13. 29 Oct, 2012 2 commits
  14. 26 Oct, 2012 3 commits
    • Johannes Berg's avatar
      mac80211: make sure data is accessible in EAPOL check · 6dbda2d0
      Johannes Berg authored
      The code to allow EAPOL frames even when the station
      isn't yet marked associated needs to check that the
      incoming frame is long enough and due to paged RX it
      also can't assume skb->data contains the right data,
      it must use skb_copy_bits(). Fix this to avoid using
      data that doesn't really exist.
      
      Cc: stable@vger.kernel.org
      Signed-off-by: default avatarJohannes Berg <johannes.berg@intel.com>
      6dbda2d0
    • Johannes Berg's avatar
      mac80211: verify that skb data is present · 9b395bc3
      Johannes Berg authored
      A number of places in the mesh code don't check that
      the frame data is present and in the skb header when
      trying to access. Add those checks and the necessary
      pskb_may_pull() calls. This prevents accessing data
      that doesn't actually exist.
      
      To do this, export ieee80211_get_mesh_hdrlen() to be
      able to use it in mac80211.
      
      Cc: stable@vger.kernel.org
      Signed-off-by: default avatarJohannes Berg <johannes.berg@intel.com>
      9b395bc3
    • Johannes Berg's avatar
      mac80211: check management frame header length · 4a4f1a58
      Johannes Berg authored
      Due to pskb_may_pull() checking the skb length, all
      non-management frames are checked on input whether
      their 802.11 header is fully present. Also add that
      check for management frames and remove a check that
      is now duplicate. This prevents accessing skb data
      beyond the frame end.
      
      Cc: stable@vger.kernel.org
      Signed-off-by: default avatarJohannes Berg <johannes.berg@intel.com>
      4a4f1a58