commit | ec7e9cb1594d88c0dee9417e5342129f8dcd553f | [log] [tgz] |
---|---|---|
author | Jeff Johnson <jjohnson@qca.qualcomm.com> | Wed Mar 27 09:29:14 2013 -0700 |
committer | Jatin Nahar <jnahar@codeaurora.org> | Tue Apr 02 09:58:36 2013 -0700 |
tree | aec088e1b2b0e8b31f2f6802d7b941652c8eb9f2 | |
parent | e4f801d4e4e08bf3193f8706b9994083632a6824 [diff] |
wlan: validate key length passed to wlan_hdd_cfg80211_add_key() Static source code analysis identified an issue where the key length being passed to wlan_hdd_cfg80211_add_key() was not being validated. As a result the operations used to copy the key could result in a buffer overflow. To prevent buffer overflow add logic to validate the key length before using it to copy the key. Change-Id: I71a86baafc114bd75af3a7c070d831786d9e0d7b