[U-Boot] [PATCH v2] bootm: Avoid 256-byte overflow in fixup_silent_linux()

Mike Frysinger vapier at gentoo.org
Wed Jan 11 00:31:28 CET 2012


On Tuesday 10 January 2012 17:51:15 Doug Anderson wrote:
> On Tue, Jan 10, 2012 at 2:28 PM, Wolfgang Denk wrote:
> > I think your patch is likely to break all these architectures?
> 
> I'm not sure how my patch would break these architectures.

if the kernel doesn't do len checking on the input string and only looks for 
trailing NUL byte, you could trigger a buffer overflow in the kernel.  
personally, i'd say that's poor behavior on the part of the kernel, but we 
should still be nice if possible ...
-mike
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 836 bytes
Desc: This is a digitally signed message part.
URL: <http://lists.denx.de/pipermail/u-boot/attachments/20120110/6989d5e8/attachment.pgp>


More information about the U-Boot mailing list