qcacmn: Fix possible buffer overflow in regulatory api
Check for channel list size before accessing it to avoid possible buffer overflow Change-Id: I2cf36adb2651a40d6e186deaef58330d1c0105ca CRs-Fixed: 2160756
This commit is contained in:

committed by
snandini

parent
da18becba6
commit
3550d5a7f6
@@ -1,5 +1,5 @@
|
|||||||
/*
|
/*
|
||||||
* Copyright (c) 2014-2017 The Linux Foundation. All rights reserved.
|
* Copyright (c) 2014-2018 The Linux Foundation. All rights reserved.
|
||||||
*
|
*
|
||||||
* Previously licensed under the ISC license by Qualcomm Atheros, Inc.
|
* Previously licensed under the ISC license by Qualcomm Atheros, Inc.
|
||||||
*
|
*
|
||||||
@@ -3815,6 +3815,8 @@ static QDF_STATUS reg_process_ch_avoid_freq(struct wlan_objmgr_psoc *psoc,
|
|||||||
|
|
||||||
for (ch_loop = 0; ch_loop < psoc_priv_obj->unsafe_chan_list.ch_cnt;
|
for (ch_loop = 0; ch_loop < psoc_priv_obj->unsafe_chan_list.ch_cnt;
|
||||||
ch_loop++) {
|
ch_loop++) {
|
||||||
|
if (ch_loop >= NUM_CHANNELS)
|
||||||
|
break;
|
||||||
reg_debug("channel %d is not safe",
|
reg_debug("channel %d is not safe",
|
||||||
psoc_priv_obj->unsafe_chan_list.
|
psoc_priv_obj->unsafe_chan_list.
|
||||||
ch_list[ch_loop]);
|
ch_list[ch_loop]);
|
||||||
|
Reference in New Issue
Block a user