commit | 5d2f25a1c491f78f3e5542d844c9c4aa9311a729 | [log] [tgz] |
---|---|---|
author | Ashish Kumar Dhanotiya <adhanoti@codeaurora.org> | Mon Feb 25 21:06:00 2019 +0530 |
committer | nshrivas <nshrivas@codeaurora.org> | Sun Mar 03 05:03:44 2019 -0800 |
tree | 97bc73307e6f033187e7a87ef47cea86bd955137 | |
parent | f880346d29916925d92dd673b271228972dbca0a [diff] |
qcacld-3.0: Fix OOB read in hdd_populate_wifi_signal_info While handling ll stats information there is a possibility of OOB read in hdd_populate_wifi_signal_info api as FW is giving num_chan info as uint_32 and host has saved into int_32 type variable which may lead to an extremely large positive number which is getting used as index of for loop to populate signal info in skp which may lead to OOB read. Change-Id: I032eb465db30ee9e3a7ba0c4f017ed781264c47d CRs-fixed: 2383605