rtlwifi: Fix potential overflow on P2P code
Nicolas Waisman noticed that even though noa_len is checked for a compatible length it's still possible to overrun the buffers of p2pinfo since there's no check on the upper bound of noa_num. Bound noa_num against P2P_MAX_NOA_NUM. Reported-by:Nicolas Waisman <nico@semmle.com> Signed-off-by:
Laura Abbott <labbott@redhat.com> Acked-by:
Ping-Ke Shih <pkshih@realtek.com> Signed-off-by:
Kalle Valo <kvalo@codeaurora.org>
Loading
-
mentioned in commit c730ab8a
-
mentioned in commit 74835deb
-
mentioned in commit 5a917b45
-
mentioned in commit e3bac952
-
mentioned in commit ed7f991a
-
mentioned in commit 272a1170
-
mentioned in commit e3494f5a
-
mentioned in commit 626ba9ae
-
mentioned in commit 225e5a1d
-
mentioned in commit 9eadbc0b
-
mentioned in commit 9aa79c17
Please sign in to comment