This repository has been archived by the owner on Jan 13, 2022. It is now read-only.
Fixed buffer overrun in PacketizedTCP::SendList() (CVSS score: n/a) #138
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This is a backport of a security relevant fix for RakNet.
The issue has already been fixed in SLikeNet 0.1.3 (see https://www.slikenet.com/).
We provide this backport for people who prefer to stick with the RakNet project and also in order to easier share this fix with other RakNet forks.
A CVSS score cannot be calculated for this one, as no direct usage of PacketizedTCP::SendList() is flawed in RakNet. The issue is therefore only triggered if 3rd-party programs using RakNet make use of the method and pass in more than 512 parameters.
This is a use case which is expected to be far off from reality, so the real world security implications are likely to be non-existant.