android_kernel_oneplus_msm8998/drivers/net/wireless/brcm80211
Arend Van Spriel b82a7f93b4 brcmfmac: avoid potential stack overflow in brcmf_cfg80211_start_ap()
commit ded89912156b1a47d940a0c954c43afbabd0c42c upstream.

User-space can choose to omit NL80211_ATTR_SSID and only provide raw
IE TLV data. When doing so it can provide SSID IE with length exceeding
the allowed size. The driver further processes this IE copying it
into a local variable without checking the length. Hence stack can be
corrupted and used as exploit.

Reported-by: Daxing Guo <freener.gdx@gmail.com>
Reviewed-by: Hante Meuleman <hante.meuleman@broadcom.com>
Reviewed-by: Pieter-Paul Giesberts <pieter-paul.giesberts@broadcom.com>
Reviewed-by: Franky Lin <franky.lin@broadcom.com>
Signed-off-by: Arend van Spriel <arend.vanspriel@broadcom.com>
Signed-off-by: Kalle Valo <kvalo@codeaurora.org>
Signed-off-by: Juerg Haefliger <juerg.haefliger@hpe.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
2016-10-31 04:13:58 -06:00
..
brcmfmac brcmfmac: avoid potential stack overflow in brcmf_cfg80211_start_ap() 2016-10-31 04:13:58 -06:00
brcmsmac brcmsmac: Initialize power in brcms_c_stf_ss_algo_channel_get() 2016-10-07 15:23:46 +02:00
brcmutil brcmfmac: show firmware release info in ethtool driver info 2015-01-29 09:59:14 +02:00
include brcm80211: Add support for brcm4371 2015-10-21 10:57:44 +03:00
Kconfig brcmfmac: expose device memory to devcoredump subsystem 2015-10-21 10:56:23 +03:00
Makefile