commit | 02cee09308432e86eeb0c0b5b2946d14f00a5988 | [log] [tgz] |
---|---|---|
author | Carles Cufi <carles.cufi@nordicsemi.no> | Mon Dec 20 11:25:31 2021 +0100 |
committer | Carles CufĂ <carles.cufi@nordicsemi.no> | Mon Dec 20 15:24:02 2021 +0100 |
tree | be7c106b819aeb51d38003e5b36f610e2f740f2b | |
parent | fef2e30b7f8346c28e84b667b05b251133823676 [diff] |
drivers: bluetooth: spi: Check lengths in incoming headers So far the lengths provided in event and ACL packets were not being checked at all, which could have caused an overflow if the contents were not to fit inside the net_buf. Check the length and discard the packet when it doesn't fit. Signed-off-by: Carles Cufi <carles.cufi@nordicsemi.no>