mirror of
https://github.com/open5gs/open5gs.git
synced 2026-04-28 03:19:31 +00:00
Add bounds checking to ogs_sbi_parse_plmn_list() and handle_scp_info() to prevent out-of-bounds writes when input exceeds the fixed array limits. - ogs_sbi_parse_plmn_list(): limit to OGS_MAX_NUM_OF_PLMN (12) - handle_scp_info(): limit to OGS_MAX_NUM_OF_SCP_DOMAIN (8) Without these checks, an unauthenticated HTTP/2 request with oversized arrays can crash any SBI-based NF (PLMN list: heap overflow → arbitrary free, SCP domain: stack overflow → stack smashing). Issues: #4382, #4383 |
||
|---|---|---|
| .. | ||
| app | ||
| asn1c | ||
| core | ||
| crypt | ||
| dbi | ||
| diameter | ||
| gtp | ||
| ipfw | ||
| metrics | ||
| nas | ||
| ngap | ||
| pfcp | ||
| proto | ||
| s1ap | ||
| sbi | ||
| sctp | ||
| tun | ||
| meson.build | ||