Skip to content
Snippets Groups Projects
  1. May 30, 2023
  2. May 16, 2023
    • Nagalakshmi's avatar
      qcacld-3.0: Fix OOB in wma_scan_roam.c · 369a7e56
      Nagalakshmi authored
      Currently in wma_extscan_hotlist_match_event_handler
      API, dest_hotlist get memory allocation based on numap
      which takes value from event->total_entries.
      But numap is limited to WMA_EXTSCAN_MAX_HOTLIST_ENTRIES
      and event->total_entries more than WMA_EXTSCAN_MAX_HOTLIST_ENTRIES
      can cause out of bound issue.
      
      Fix is to populate dest_hotlist->numOfAps from numap
      instead of event->total_entries to avoid any out of bound issue.
      
      Change-Id: I756f7e4a4dcd454508bba83d4a8bbbb139530905
      CRs-Fixed: 3346781
  3. Feb 17, 2023
    • Aravind Kishore Sukla's avatar
      qcacld-3.0: Ignore CSA request for invalid channel · 18c18148
      Aravind Kishore Sukla authored
      In present scenario, STA disconnects with AP if it receives
      invalid channel in CSA IE. In this case STA shouldn't
      disconnect with AP as this request may come from a spoof AP.
      
      Ignore this CSA request as it might be from spoof AP and
      if it is from genuine AP heart beat failure happens and
      results in disconnection. After disconnection DUT may
      reconnect to same or other APs.
      
      Change-Id: I554bda1c3a0aa96e97d7fdf4dc160be8a2e7f452
      CRs-Fixed: 3390251
      3 tags
      18c18148
  4. Dec 16, 2022
    • Bing Sun's avatar
      qcacld-3.0: Lock all the entry of ch power info · 438bef70
      Bing Sun authored
      If the entry of ch power info is not locked, free after use may be
      happened. For example, csr_save_to_channel_power2_g_5_g does
      csr_purge_channel_power, while csr_save_tx_power_to_cfg is called
      in another thread and it calls csr_ll_peek_head then does some
      operation on the entry.
      
      Change-Id: If6cc4d8e0072e97288b60d3c72499b79c0a2bf67
      CRs-Fixed: 2580147
      2 tags
      438bef70
  5. Mar 26, 2022
    • Jianmin Zhu's avatar
      cld-2.0: Fix array OOB for duplicate rate · 1eb39939
      Jianmin Zhu authored
      Some IoT AP may have duplicate rates in supported rates and
      extended rates in beacon, need filter them when populate peer 11a/11b
      rates during connect/roaming, or array out of bound issue will happen.
      
      Change-Id: I685e8c07ee147296bfa22742dad4210e7fa02c4a
      CRs-Fixed: 3048142
      7 tags
      1eb39939
  6. Dec 20, 2021
    • Bapiraju Alla's avatar
      qcacld-3.0: Validate NDP app info length before accessing NDP app info · 18eae871
      Bapiraju Alla authored
      Currently, NDP app info length is not being validated with max NDP
      app info length. This may result in buffer oveflow wile accessing
      NDP app info received from the firmware.
      To address this, validate NDP app info length before accessing NDP
      app info
      
      Change-Id: Ifddf1afca7ecf2585e8eb450864d9ba127238f6e
      CRs-Fixed: 3073345
      3 tags
      18eae871
  7. Nov 08, 2021
    • Deeksha Gupta's avatar
      qcacld-3.0: Fix possible OOB in unpack_tlv_core · 8b4668e6
      Deeksha Gupta authored
      Currently in unpack_tlv_core(), nBufRemaining is validated
      after calling framesntohs API. Since, framesntohs() copies
      pIn address to pOut address with length = 2 bytes as below.
      DOT11F_MEMCPY(pCtx, (uint16_t *)pOut, pIn, 2);
      which could cause OOB issue if pIn contains less than 2 bytes.
      Fix is to validate the nBufRemaining size before calling
      framesntohs().
      
      Change-Id: I3ead03ec948282a410ddba5b01f82ca31d3d9199
      CRs-Fixed: 3042282
      2 tags
      8b4668e6
  8. Nov 05, 2021
  9. Sep 29, 2021
  10. Jul 12, 2021
  11. May 21, 2021
  12. May 20, 2021
  13. Feb 10, 2021
    • Srinivas Dasari's avatar
      qcacld-3.0: Send assoc reject upon failing to post ASSOC_IND · 930cb34a
      Srinivas Dasari authored
      Currently, lim silently drops the association if it fails to
      post ASSOC_IND due to some reason(e.g. invalid contents of
      assoc request) and the MLM state is stuck in
      eLIM_MLM_WT_ASSOC_CNF_STATE. Station context is not cleaned up
      till the next association. Gracefully cleanup the association
      in such failure cases.
      
      Change-Id: Iede43a1ddc4ac6ef300af02776b153b58dd70c2c
      CRs-Fixed: 2810235
  14. Jul 13, 2020
  15. Mar 19, 2020
    • Gururaj Pandurangi's avatar
      qcacld-3.0: Fix while condition in rrm_fill_beacon_ies() · e5c7fe8a
      Gururaj Pandurangi authored
      In function rrm_fill_beacon_ies, do while loop is checked
      for BcnNumIes if it is greater than IE length 0. Fix the
      check to be greater than 2 as the first two bytes is IE
      header(element ID and IE length fields both 1 byte each.)
      
      Change-Id: I11e5de481cd49a22acafee938fbe73f839f5b0e4
      CRs-Fixed: 2626729
      2 tags
      e5c7fe8a
  16. Mar 11, 2020
    • Pragaspathi Thilagaraj's avatar
      qcacld-3.0: Fix integer overflow in rrm_fill_beacon_ies() · a8b6b06a
      Pragaspathi Thilagaraj authored
      In function rrm_fill_beacon_ies, the total IE length is
      calculated as sum of length field of the IE and 2 (element id 1
      byte and IE length field 1 byte). The total IE length is defined
      of type uint16_t and will overflow if the *(pBcnIes + 1)=0xfe.
      
      Validate the len against total IE length to avoid overflow.
      
      Change-Id: If8f86952ce43c5923906fc6ef18705f1785c5d88
      CRs-Fixed: 2573329
      a8b6b06a
  17. Mar 03, 2020
  18. Jan 14, 2020
  19. Jan 11, 2020
  20. Jan 03, 2020
    • Dundi Raviteja's avatar
      qcacld-3.0: OOB access may occur due to total numChannels exceeds max value · 4be1391d
      Dundi Raviteja authored
      Out of Buffer access may occur in wmi_get_buf_extscan_start_cmd()
      function if user provided inputs are different for below parameters
      which are assigned in hdd_extscan_start_fill_bucket_channel_spec()
      function
      
      1. QCA_WLAN_VENDOR_ATTR_EXTSCAN_BUCKET_SPEC_NUM_CHANNEL_SPECS
      2. QCA_WLAN_VENDOR_ATTR_EXTSCAN_CHANNEL_SPEC
      
      To address this issue return failure status if numChannels is not
      equal to the total number of channel entries.
      
      Change-Id: I60d74161dc3752bd7f609af3910d7c86a99488ec
      CRs-Fixed: 2255189
      4be1391d
  21. Oct 25, 2019
  22. Oct 15, 2019
    • gaurank kathpalia's avatar
      qcacld-3.0: Remove off-by-one write condition in sch_beacon_process · cc976bd1
      gaurank kathpalia authored
      In the API, the driver inserts 0 after the SSID name, to mark the
      end of the ssid, but if the SSID name is 32 characters which is
      the max SSID length possible, the driver puts 0 at the 33rd
      place of memory which is not the part of the SSID name, which
      results in OOB write, or off-by-one write condition.
      
      Fix is to remove the addition of 0 after ssid, as in every
      case the driver prints the ssid, taking the ssid length
      as the input, and in that case insertion of 0 will not serve
      any purpose.
      
      Change-Id: I1d58026ec9f48fe9d00bd2f50783c65899588978
      CRs-Fixed: 2232526
      2 tags
      cc976bd1
  23. Sep 20, 2019
  24. Sep 19, 2019
    • Ashish Kumar Dhanotiya's avatar
      qcacld-3.0: Buffer overwrite in vendor scan request on n_ssid · f6ddfb35
      Ashish Kumar Dhanotiya authored
      In function __wlan_hdd_cfg80211_vendor_scan, when SCAN_SSIDS
      and QCA_WLAN_VENDOR_ATTR_SCAN_FREQUENCIES are parsed, if the
      number of SSIDs or number of channels are more then 255 in
      netlink message, n_ssid and n_channels will get overflow
      because n_ssid and n_channels are of type uint8_t.
      
      Update the type of n_ssid and n_channels from uint8_t
      to uint32_t.
      
      Change-Id: Ib31dcc912fee8639e26d836d2fc5a32bf81fb43d
      CRs-Fixed: 2153343
      f6ddfb35
    • Bala Venkatesh's avatar
      qcacld-3.0: Fix possible integer underflow in cfg80211_rx_mgmt · 3029dcc3
      Bala Venkatesh authored
      In the function cfg80211_rx_mgmt, data_len is calculated as
      len - ieee80211_hdrlen(mgmt->frame_control). Len is not
      validated before this calculation. So a possible integer
      underflow will occur if len value is less than the value of
      ieee80211_hdrlen(mgmt->frame_control).
      Validate the value of len against
      ieee80211_hdrlen(mgmt->frame_control) in the caller.
      
      Change-Id: Iae776daf37b0c052bd4ce4da44ea728d121eae51
      CRs-Fixed: 2263758
      3029dcc3
    • gaurank kathpalia's avatar
      qcacld-3.0: Fix memory double free condition in wma_roam_update_vdev · 540168c6
      gaurank kathpalia authored
      The driver allocates memory to del_sta_params in API
      wma_roam_update_vdev. In the call of wma_delete_sta API
      the driver does mem-free for del_sta_params
      
      But in the main API wma_roam_update_vdev, after the function call
      of wma_delete_sta, the driver does mem-free again, which could
      mem free of memory block allocated to some other block.
      Fix is to remove the mem-free of del_sta_params
      in API wma_roam_update_vdev
      
      Change-Id: I79c69f6e6f10650cd57fd85dc4d79e8677976247
      CRs-Fixed: 2214574
      540168c6
  25. Sep 14, 2019
Loading