Files
u-boot/common
Heinrich Schuchardt 7bae13da36 cli: avoid buffer overrun
Invoking the sandbox with

    /u-boot -c ⧵0xef⧵0xbf⧵0xbd

results in a segmentation fault.

Function b_getch() retrieves a character from the input stream. This
character may be > 0x7f. If type char is signed, static_get() will
return a negative number and in parse_stream() we will use that
negative number as an index for array map[] resulting in a buffer
overflow.

Reported-by: Harry Lockyer <harry_lockyer@tutanota.com>
Signed-off-by: Heinrich Schuchardt <heinrich.schuchardt@canonical.com>
Reviewed-by: Simon Glass <sjg@chromium.org>
2023-05-31 17:23:01 -04:00
..
2022-10-31 11:02:44 -04:00
2023-04-24 21:37:45 +02:00
2023-04-27 13:51:06 -04:00
2023-05-31 17:23:01 -04:00
2023-03-30 15:09:59 -04:00
2022-11-02 08:42:03 +01:00
2022-01-19 18:11:34 +01:00
2023-02-10 07:41:39 -05:00
2022-08-04 16:18:47 -04:00
2023-02-09 16:32:26 -05:00
2023-02-06 13:04:53 -05:00
2023-03-14 16:08:51 -06:00
2023-01-09 11:30:08 -05:00
2021-04-20 07:31:12 -04:00
2023-02-07 14:33:50 -05:00