summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorKevin F. Haggerty <haggertk@lineageos.org>2020-05-05 07:52:49 -0600
committerKevin F. Haggerty <haggertk@lineageos.org>2020-05-05 07:52:49 -0600
commit881b417698ecf57b92723b2f6e8d68842c70d002 (patch)
tree16eb5042500287b58c831c8ccc0f6ca014cfc99c
parent999624ee333a402f1f517593ccbe09532dedac5d (diff)
parent73c22e6cdbfc5d099985c70edf9670686cc331a9 (diff)
downloadandroid_system_bt-lineage-16.0.tar.gz
android_system_bt-lineage-16.0.tar.bz2
android_system_bt-lineage-16.0.zip
Merge tag 'android-9.0.0_r56' of https://android.googlesource.com/platform/system/bt into staging/lineage-16.0_merge-android-9.0.0_r56lineage-16.0
Android 9.0.0 release 56 * tag 'android-9.0.0_r56' of https://android.googlesource.com/platform/system/bt: Fix potential stack overflow caused by integer overflow GattServcer: Check invalid offset AAC Decoder: Use osi_free() to free buffers allocated by osi_malloc() Change-Id: I0e84d852e9ed217b542b8fd409a4dc6bf59841cf
-rw-r--r--service/gatt_server.cc7
-rw-r--r--stack/a2dp/a2dp_aac_decoder.cc4
-rw-r--r--stack/smp/smp_cmac.cc3
3 files changed, 11 insertions, 3 deletions
diff --git a/service/gatt_server.cc b/service/gatt_server.cc
index 52fd1edf6..f46927d70 100644
--- a/service/gatt_server.cc
+++ b/service/gatt_server.cc
@@ -18,6 +18,7 @@
#include <base/logging.h>
+#include "osi/include/log.h"
#include "service/logging_helpers.h"
#include "stack/include/bt_types.h"
@@ -116,6 +117,12 @@ bool GattServer::SendResponse(const std::string& device_address, int request_id,
return false;
}
+ if (offset < 0) {
+ android_errorWriteLog(0x534e4554, "143231677");
+ LOG(ERROR) << "Offset is less than 0 offset: " << offset;
+ return false;
+ }
+
if (value.size() + offset > BTGATT_MAX_ATTR_LEN) {
LOG(ERROR) << "Value is too large";
return false;
diff --git a/stack/a2dp/a2dp_aac_decoder.cc b/stack/a2dp/a2dp_aac_decoder.cc
index d9cd85dc6..d998d7d47 100644
--- a/stack/a2dp/a2dp_aac_decoder.cc
+++ b/stack/a2dp/a2dp_aac_decoder.cc
@@ -30,7 +30,7 @@
typedef struct {
HANDLE_AACDECODER aac_handle;
bool has_aac_handle; // True if aac_handle is valid
- INT_PCM* decode_buf;
+ INT_PCM* decode_buf = nullptr;
decoded_data_callback_t decode_callback;
} tA2DP_AAC_DECODER_CB;
@@ -58,7 +58,7 @@ bool a2dp_aac_decoder_init(decoded_data_callback_t decode_callback) {
void a2dp_aac_decoder_cleanup(void) {
if (a2dp_aac_decoder_cb.has_aac_handle)
aacDecoder_Close(a2dp_aac_decoder_cb.aac_handle);
- free(a2dp_aac_decoder_cb.decode_buf);
+ osi_free(a2dp_aac_decoder_cb.decode_buf);
memset(&a2dp_aac_decoder_cb, 0, sizeof(a2dp_aac_decoder_cb));
}
diff --git a/stack/smp/smp_cmac.cc b/stack/smp/smp_cmac.cc
index 42f91a0c4..30ccef974 100644
--- a/stack/smp/smp_cmac.cc
+++ b/stack/smp/smp_cmac.cc
@@ -278,7 +278,8 @@ static bool cmac_generate_subkey(BT_OCTET16 key) {
******************************************************************************/
bool aes_cipher_msg_auth_code(BT_OCTET16 key, uint8_t* input, uint16_t length,
uint16_t tlen, uint8_t* p_signature) {
- uint16_t len, diff;
+ uint32_t len;
+ uint16_t diff;
uint16_t n = (length + BT_OCTET16_LEN - 1) /
BT_OCTET16_LEN; /* n is number of rounds */
bool ret = false;