forked from osmocom/wireshark
DCT2000: fix a buffer overflow in case of malformed packet
Bug: 12750 Change-Id: Iff20efa46e000ab4ae77b2edbcb0b9af4634508c Reviewed-on: https://code.wireshark.org/review/17096 Reviewed-by: Pascal Quantin <pascal.quantin@gmail.com> Petri-Dish: Pascal Quantin <pascal.quantin@gmail.com> Tested-by: Petri Dish Buildbot <buildbot-no-reply@wireshark.org> Reviewed-by: Anders Broman <a.broman58@gmail.com>
This commit is contained in:
parent
3b97fbddc2
commit
2e37b271c4
|
@ -1578,6 +1578,9 @@ static void attach_fp_info(packet_info *pinfo, gboolean received, const char *pr
|
|||
|
||||
/* Number of channels (for coordinated channels) */
|
||||
p_fp_info->num_chans = outhdr_values[i++];
|
||||
if (p_fp_info->num_chans > MAX_FP_CHANS) {
|
||||
p_fp_info->num_chans = MAX_FP_CHANS;
|
||||
}
|
||||
|
||||
/* EDCH-Common is always T2 */
|
||||
if (p_fp_info->channel == CHANNEL_EDCH_COMMON) {
|
||||
|
|
Loading…
Reference in New Issue