1
0
mirror of https://github.com/RIOT-OS/RIOT.git synced 2025-12-27 15:31:17 +01:00
bors[bot] 72a0f1972d
Merge #18746 #19161
18746: sys/clif: Fixing out of bounds read under certain conditions r=maribu a=Teufelchen1

Hi 😈

This fixes a potential out of bounds read in clif_encode_link. There is no code in RIOT that can be exploited.
The fix does not break the current API but alters the behaviour slightly. Before the change, the length attributes of `clif_attr_t` where optional. If missing, the length was deduced using `strlen()`. This fix makes those parameters required and if they are `0` it operates as if the length really is `0`. This might not be ideal but it is the only non api breaking fix I could think off. 
```c
typedef struct {
    char *value;                  
    unsigned value_len;    NO LONGER OPTIONAL
    const char *key;               
    unsigned key_len;       NO LONGER OPTIONAL
} clif_attr_t;
```
Depends on #18744

cc `@leandrolanzieri` 

19161: bors.yaml: re-activate labels check + add block_labels r=miri64 a=miri64



Co-authored-by: Teufelchen1 <bennet.blischke@haw-hamburg.de>
Co-authored-by: Martine Lenders <m.lenders@fu-berlin.de>
2023-02-23 16:39:44 +00:00
..
2023-01-13 13:58:07 +01:00
2022-09-14 15:05:25 +02:00
2023-01-19 13:05:15 +01:00
2022-09-23 16:42:52 +02:00
2023-02-22 15:50:59 +00:00
2022-02-11 12:38:21 +01:00
2022-09-05 07:46:56 +02:00
2022-09-14 15:05:25 +02:00
2021-06-02 14:07:17 +02:00
2022-09-16 14:00:35 +02:00
2021-12-15 12:41:36 +01:00
2023-01-13 13:58:07 +01:00
2022-11-15 22:05:42 +01:00
2022-12-19 13:03:45 +01:00
2021-08-13 19:50:38 +02:00
2023-01-13 13:58:07 +01:00
2021-12-07 13:00:58 +01:00
2023-01-21 21:45:41 +00:00
2021-08-13 19:50:38 +02:00
2022-12-05 16:13:21 +01:00
2022-07-26 19:46:14 +02:00
2021-01-17 00:17:58 +01:00
2022-11-22 13:39:35 +01:00
2022-11-22 13:39:35 +01:00
2021-08-13 19:50:38 +02:00
2021-12-06 11:53:59 +01:00
2022-02-12 18:30:58 +01:00
2021-08-13 19:50:38 +02:00
2022-08-03 22:09:21 +02:00
2022-09-29 22:01:37 +02:00