summaryrefslogtreecommitdiff
path: root/lib/flex_array.c
diff options
context:
space:
mode:
authorAshish Kumar Dhanotiya <adhanoti@codeaurora.org>2019-07-26 12:12:56 +0530
committerGerrit - the friendly Code Review server <code-review@localhost>2021-01-04 02:54:37 -0800
commitaeff453291edb96372a64f642b82a476cad392e2 (patch)
tree53eb58292b5e31033164e0521590df4c98a4e087 /lib/flex_array.c
parent511f7a3487e32c2ca0195849f181ca65fa1a6028 (diff)
qcacld-3.0: Possible integer overflow in hdd apf read memory cb
In hdd_apf_read_memory_cb, context buffer length is checked against sum of packet offset and event length, packet offset and event length are extracted from FW response and can lead to integer overflow, which will allow to pass the length check and eventually will lead to buffer overwrite when event data is copied to context buffer. To avoid this issue, validate the event length against the available length in the context buffer, which can be obtained by getting difference of packet offset from the context buffer length. Change-Id: I53798e56403f1c550f0a762645ccd67a1dc8500d CRs-fixed: 2436502
Diffstat (limited to 'lib/flex_array.c')
0 files changed, 0 insertions, 0 deletions