Преглед на файлове

qcacld-3.0: Fix OOB access in iface combination loop

While iface combination dump looping based on max interfaces
defined but some iface array have index of max - 1, which
will lead Out-of-bound access of 2 bytes.

For example, wlan_hdd_sta_iface_limit supports max 2 interfaces,
but defined only one array of index.

Check with size of the array, So, only available index will access.

Change-Id: I9ab02557ea7b4290d56ef359a3d9072fd9b1e53d
CRs-Fixed: 3668965
Vinod Kumar Myadam преди 1 година
родител
ревизия
7fa23042dc
променени са 1 файла, в които са добавени 10 реда и са изтрити 8 реда
  1. 10 8
      core/hdd/src/wlan_hdd_cfg80211.c

+ 10 - 8
core/hdd/src/wlan_hdd_cfg80211.c

@@ -21940,20 +21940,22 @@ static char *wlan_hdd_iface_debug_string(uint32_t iface_type)
 static void wlan_hdd_dump_iface_combinations(uint32_t num,
 			const struct ieee80211_iface_combination *combination)
 {
-	int i, j;
+	int i, j, k;
 	char buf[IFACE_DUMP_SIZE] = {0};
 	uint8_t len = 0;
 
 	hdd_debug("max combinations %d", num);
 
 	for (i = 0; i < num; i++) {
-		for (j = 0; j < combination[i].max_interfaces; j++) {
-			if (combination[i].limits[j].types)
-				len += qdf_scnprintf(buf + len,
-						     IFACE_DUMP_SIZE - len,
-						     " + %s",
-					wlan_hdd_iface_debug_string(
-					combination[i].limits[j].types));
+		for (j = 0; j < combination[i].n_limits; j++) {
+			for (k = 0; k < combination[i].limits[j].max; k++) {
+				if (combination[i].limits[j].types)
+					len += qdf_scnprintf(buf + len,
+					       IFACE_DUMP_SIZE - len,
+					       k == 0 && j == 0 ? "%s" : "+%s",
+					       wlan_hdd_iface_debug_string(
+					       combination[i].limits[j].types));
+			}
 		}
 
 		hdd_nofl_debug("iface combination[%d]: %s", i, buf);