Parcourir la source

qcacld-3.0: Add NULL check for heap allocations

In function hdd_association_completion_handler, there are missing NULL
checks for couple of heap allocated variables. This can lead to
potential NULL pointer dereference.

Add NULL pointer sanity check.

Change-Id: I4343833b9e12da0012cfbff006bd8891e9bae025
CRs-Fixed: 2556755
Sourav Mohapatra il y a 5 ans
Parent
commit
32354389fb
1 fichiers modifiés avec 9 ajouts et 1 suppressions
  1. 9 1
      core/hdd/src/wlan_hdd_assoc.c

+ 9 - 1
core/hdd/src/wlan_hdd_assoc.c

@@ -3090,6 +3090,9 @@ hdd_association_completion_handler(struct hdd_adapter *adapter,
 
 		reqRsnIe = qdf_mem_malloc(sizeof(uint8_t) *
 					  DOT11F_IE_RSN_MAX_LEN);
+		if (!reqRsnIe)
+			return QDF_STATUS_E_NOMEM;
+
 		/*
 		 * For reassoc, the station is already registered, all we need
 		 * is to change the state of the STA in TL.
@@ -3103,10 +3106,15 @@ hdd_association_completion_handler(struct hdd_adapter *adapter,
 			u8 *assoc_req = NULL;
 			unsigned int assoc_req_len = 0;
 			struct ieee80211_channel *chan;
+			uint32_t rsp_rsn_lemgth = DOT11F_IE_RSN_MAX_LEN;
 			uint8_t *rsp_rsn_ie =
 				qdf_mem_malloc(sizeof(uint8_t) *
 					       DOT11F_IE_RSN_MAX_LEN);
-			uint32_t rsp_rsn_lemgth = DOT11F_IE_RSN_MAX_LEN;
+			if (!rsp_rsn_ie) {
+				qdf_mem_free(reqRsnIe);
+				return QDF_STATUS_E_NOMEM;
+			}
+
 
 			/* add bss_id to cfg80211 data base */
 			bss =