Staging: vt6655-6: check keysize before memcpy()
authorDan Carpenter <dan.carpenter@oracle.com>
Thu, 29 Mar 2012 06:43:54 +0000 (09:43 +0300)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Tue, 10 Apr 2012 16:17:34 +0000 (09:17 -0700)
We need to check the we don't copy too much memory.  This comes from a
copy_from_user() in the ioctl.

Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
drivers/staging/vt6655/key.c
drivers/staging/vt6656/key.c

index 0ff8d7bbf2a7879af4536dfe37d2708c6890f525..774b0d4a7e068b811242924ff708ca48b0463d35 100644 (file)
@@ -655,6 +655,9 @@ bool KeybSetDefaultKey (
         return (false);
     }
 
+    if (uKeyLength > MAX_KEY_LEN)
+           return false;
+
     pTable->KeyTable[MAX_KEY_TABLE-1].bInUse = true;
     for(ii=0;ii<ETH_ALEN;ii++)
         pTable->KeyTable[MAX_KEY_TABLE-1].abyBSSID[ii] = 0xFF;
index 27bb523c8a97853db0c8ca8911b05062d1fd62cb..ee62a06a75f4bfb0dd06fc6b93a0dfa0c6c98769 100644 (file)
@@ -684,6 +684,9 @@ BOOL KeybSetDefaultKey(
         return (FALSE);
     }
 
+    if (uKeyLength > MAX_KEY_LEN)
+           return false;
+
     pTable->KeyTable[MAX_KEY_TABLE-1].bInUse = TRUE;
     for (ii = 0; ii < ETH_ALEN; ii++)
         pTable->KeyTable[MAX_KEY_TABLE-1].abyBSSID[ii] = 0xFF;