diff options
| author | Lee Jones <lee@kernel.org> | 2024-07-05 10:43:39 +0300 |
|---|---|---|
| committer | Greg Kroah-Hartman <gregkh@linuxfoundation.org> | 2024-07-05 10:57:24 +0300 |
| commit | 6d3c721e686ea6c59e18289b400cc95c76e927e0 (patch) | |
| tree | 09b319a96730f64eefebf29dcbe2cec37a66343f /tools/perf/scripts/python/syscall-counts-by-pid.py | |
| parent | 2bf35ea46d0bc379c456e14c0ec1dc1e003b39f1 (diff) | |
| download | linux-6d3c721e686ea6c59e18289b400cc95c76e927e0.tar.xz | |
usb: gadget: configfs: Prevent OOB read/write in usb_string_copy()
Userspace provided string 's' could trivially have the length zero. Left
unchecked this will firstly result in an OOB read in the form
`if (str[0 - 1] == '\n') followed closely by an OOB write in the form
`str[0 - 1] = '\0'`.
There is already a validating check to catch strings that are too long.
Let's supply an additional check for invalid strings that are too short.
Signed-off-by: Lee Jones <lee@kernel.org>
Cc: stable <stable@kernel.org>
Link: https://lore.kernel.org/r/20240705074339.633717-1-lee@kernel.org
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Diffstat (limited to 'tools/perf/scripts/python/syscall-counts-by-pid.py')
0 files changed, 0 insertions, 0 deletions
