From 0e75b3c35241f1bc7aa8a770993c347c47763568 Mon Sep 17 00:00:00 2001 From: Jouni Malinen Date: Sun, 10 Jan 2010 19:00:25 +0200 Subject: [PATCH] Use zero address when reporting unknown peer in SMK error This avoids potential use of uninitialized stack memory when printing out peer address based on SMK error message that does not include the MAC address. --- src/rsn_supp/peerkey.c | 2 ++ 1 file changed, 2 insertions(+) diff --git a/src/rsn_supp/peerkey.c b/src/rsn_supp/peerkey.c index 59f7279b9..9d60d4ace 100644 --- a/src/rsn_supp/peerkey.c +++ b/src/rsn_supp/peerkey.c @@ -634,6 +634,8 @@ static int wpa_supplicant_process_smk_error( if (kde.mac_addr && kde.mac_addr_len >= ETH_ALEN) os_memcpy(peer, kde.mac_addr, ETH_ALEN); + else + os_memset(peer, 0, ETH_ALEN); os_memcpy(&error, kde.error, sizeof(error)); error_type = be_to_host16(error.error_type); wpa_msg(sm->ctx->msg_ctx, MSG_INFO,