diff options
| author | Nachiket Kukade <nkukade@codeaurora.org> | 2018-01-15 12:30:13 +0530 |
|---|---|---|
| committer | Gerrit - the friendly Code Review server <code-review@localhost> | 2018-01-16 05:22:02 -0800 |
| commit | d0d7181685f7f2159d0999e6ea6927ed0c8ccef6 (patch) | |
| tree | f0ec52e93529fe4f993348bbadd0174ef52f61a0 /tools/perf/scripts/python/cs-trace-disasm.py | |
| parent | 7cc5715876e45e5d6105d03b7ea411608586e2a7 (diff) | |
qcacld-2.0: Add maximum bound check on WPA RSN IE length
In set_ie after receiving DOT11F_EID_RSN, WPA RSN IE is copied from
source without a check on the given IE length. A malicious IE length
can cause buffer overflow.
Apply the same logic from Id159d307e8f9c1de720d4553a7c29f23cbd28571
that was applied under DOT11F_EID_WPA. This adds maximum bound check
on WPA RSN IE length.
Change-Id: I04f980fe44328b1a3f6a6d4854228cc4c9f1a1c7
CRs-Fixed: 2169222
Diffstat (limited to 'tools/perf/scripts/python/cs-trace-disasm.py')
0 files changed, 0 insertions, 0 deletions
