Donate to e Foundation | Murena handsets with /e/OS | Own a part of Murena! Learn more

Commit abf3cc97 authored by Dowon Park's avatar Dowon Park Committed by Chris Manton
Browse files

Fix null pointer dereference in HACK_acl_check_sm4



fix to return when p_acl is null to avoid null pointer dereference
problem.

Sponsor: cmanton@
Bug: 198338740
Tag: #refactor
Test: gd/cert/run

Change-Id: I45408a2b024dc424442bf3c2f92293b8942b54bb
Signed-off-by: default avatarDowon Park <dowon.park@samsung.com>
parent 1bfeb168
Loading
Loading
Loading
Loading
+1 −0
Original line number Diff line number Diff line
@@ -2960,6 +2960,7 @@ void HACK_acl_check_sm4(tBTM_SEC_DEV_REC& record) {
  if (p_acl == nullptr) {
    LOG_WARN("Unable to find active acl for authentication device:%s",
             PRIVATE_ADDRESS(record.RemoteAddress()));
    return;
  }

  // If we have not received the SSP feature record