3d3d3c4fdb59efeec5759cc86f0553a6d98bbbe2

Currently, in wlan_defrag_elemsubelem_fragseq() API, there is possible buffer over-read in fragbuff buffer. Buffer may have a malicious length larger than their payload size, which leads to a buffer over-read during defragmentation. Fix is to validate the fragment length against the buffer boundary in util_get_successorfrag(). Change-Id: Ia9e688a0ab17954eb464ec586820bb95b51f12d1 CRs-Fixed: 3236560
This is CNSS WLAN Host Driver for products starting from iHelium
Description
Languages
C
98.7%
C++
0.9%
Makefile
0.3%
Starlark
0.1%