소스 검색

qcacmn: Fix possible buffer overflow in regulatory api

Check for channel list size before accessing it to avoid
possible buffer overflow

Change-Id: I2cf36adb2651a40d6e186deaef58330d1c0105ca
CRs-Fixed: 2160756
Kiran Kumar Lokere 7 년 전
부모
커밋
3550d5a7f6
1개의 변경된 파일3개의 추가작업 그리고 1개의 파일을 삭제
  1. 3 1
      umac/regulatory/core/src/reg_services.c

+ 3 - 1
umac/regulatory/core/src/reg_services.c

@@ -1,5 +1,5 @@
 /*
- * Copyright (c) 2014-2017 The Linux Foundation. All rights reserved.
+ * Copyright (c) 2014-2018 The Linux Foundation. All rights reserved.
  *
  * Previously licensed under the ISC license by Qualcomm Atheros, Inc.
  *
@@ -3815,6 +3815,8 @@ static QDF_STATUS reg_process_ch_avoid_freq(struct wlan_objmgr_psoc *psoc,
 
 	for (ch_loop = 0; ch_loop < psoc_priv_obj->unsafe_chan_list.ch_cnt;
 		ch_loop++) {
+		if (ch_loop >= NUM_CHANNELS)
+			break;
 		reg_debug("channel %d is not safe",
 			psoc_priv_obj->unsafe_chan_list.
 			ch_list[ch_loop]);