diff options
author | Subbaraman Narayanamurthy <subbaram@codeaurora.org> | 2016-10-13 19:16:27 -0700 |
---|---|---|
committer | Subbaraman Narayanamurthy <subbaram@codeaurora.org> | 2016-10-17 19:17:37 -0700 |
commit | 674a59bceb4244dbf56c364bc490df478d2286ca (patch) | |
tree | d941172efec8ae943132f69c471e9748ec94a918 /kernel/workqueue.c | |
parent | e657410985b5d33b0b4e76f08587345e9fb195ce (diff) |
fg-util: fix a possible buffer overflow
If the string passed is of a huge size, then bytes_read can be
higher and can overflow "pos" to a small value. This can cause
a potential buffer overflow when "pos" is used again in sscanf.
Fix this by validating bytes_read before it is used.
CRs-Fixed: 1077693
Change-Id: I59d4472b49b67f481992867a34e6779a4589d035
Signed-off-by: Subbaraman Narayanamurthy <subbaram@codeaurora.org>
Diffstat (limited to 'kernel/workqueue.c')
0 files changed, 0 insertions, 0 deletions