-
- Downloads
net: wireless: bcmdhd: additional length check for BRCM EVENT frame.
This is just for exceptional case where user has updated kernel to the
latest, but still used non-patched firmware. The non-patched firmware
could deliver ETHER_TYPE_BRCM packet to host.
If attacker inject packet with its header length forged, it could bypass
current host driver's length check routine and cause memory corruption.
Proposed fix is enhancing length check to validate its header length.
Change-Id: I90fc5101bddfd1d427e0a52758ddf8bc16577555
Bug: 37168488
Signed-off-by:
Insun Song <insun.song@broadcom.com>
Loading
Please register or sign in to comment