summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorLee Gibson <leegib@gmail.com>2021-04-19 17:58:42 +0300
committerKalle Valo <kvalo@codeaurora.org>2021-04-22 17:40:12 +0300
commit130f634da1af649205f4a3dd86cbe5c126b57914 (patch)
treea90e9135a7a4a04b8c969af89349777c93c46f6e
parenta9a4c080deb33f44e08afe35f4ca4bb9ece89f4e (diff)
downloadlinux-130f634da1af649205f4a3dd86cbe5c126b57914.tar.xz
qtnfmac: Fix possible buffer overflow in qtnf_event_handle_external_auth
Function qtnf_event_handle_external_auth calls memcpy without checking the length. A user could control that length and trigger a buffer overflow. Fix by checking the length is within the maximum allowed size. Signed-off-by: Lee Gibson <leegib@gmail.com> Signed-off-by: Kalle Valo <kvalo@codeaurora.org> Link: https://lore.kernel.org/r/20210419145842.345787-1-leegib@gmail.com
-rw-r--r--drivers/net/wireless/quantenna/qtnfmac/event.c6
1 files changed, 4 insertions, 2 deletions
diff --git a/drivers/net/wireless/quantenna/qtnfmac/event.c b/drivers/net/wireless/quantenna/qtnfmac/event.c
index c775c177933b..8dc80574d08d 100644
--- a/drivers/net/wireless/quantenna/qtnfmac/event.c
+++ b/drivers/net/wireless/quantenna/qtnfmac/event.c
@@ -570,8 +570,10 @@ qtnf_event_handle_external_auth(struct qtnf_vif *vif,
return 0;
if (ev->ssid_len) {
- memcpy(auth.ssid.ssid, ev->ssid, ev->ssid_len);
- auth.ssid.ssid_len = ev->ssid_len;
+ int len = clamp_val(ev->ssid_len, 0, IEEE80211_MAX_SSID_LEN);
+
+ memcpy(auth.ssid.ssid, ev->ssid, len);
+ auth.ssid.ssid_len = len;
}
auth.key_mgmt_suite = le32_to_cpu(ev->akm_suite);