commit | ee33af324931688a75bcc741f1b6cfbeb4584596 | [log] [tgz] |
---|---|---|
author | Laura Abbott <[email protected]> | Fri Oct 18 07:43:21 2019 -0400 |
committer | Greg Kroah-Hartman <[email protected]> | Sat Oct 26 17:05:09 2019 +0200 |
tree | 0b472e443973a12a86af3b3b5c75ca7492fb644a | |
parent | 5b3b15827c1bab3935b489216c992bdf489546e7 [diff] |
rtlwifi: Fix potential overflow on P2P code commit 8c55dedb795be8ec0cf488f98c03a1c2176f7fb1 upstream. Nicolas Waisman noticed that even though noa_len is checked for a compatible length it's still possible to overrun the buffers of p2pinfo since there's no check on the upper bound of noa_num. Bound noa_num against P2P_MAX_NOA_NUM. Bug: 142967706 Reported-by: Nicolas Waisman <[email protected]> Signed-off-by: Laura Abbott <[email protected]> Acked-by: Ping-Ke Shih <[email protected]> Signed-off-by: Kalle Valo <[email protected]> Signed-off-by: Greg Kroah-Hartman <[email protected]> Signed-off-by: Greg Kroah-Hartman <[email protected]> Change-Id: I90a9b285feb50b6b5c30e242756d47848902b634