]> git.ipfire.org Git - thirdparty/u-boot.git/commitdiff
common/spl: guard against buffer overflow in spl_fit_get_image_name()
authorHeinrich Schuchardt <heinrich.schuchardt@canonical.com>
Tue, 24 Jun 2025 15:34:31 +0000 (17:34 +0200)
committerTom Rini <trini@konsulko.com>
Thu, 26 Jun 2025 17:58:17 +0000 (11:58 -0600)
A malformed FIT image could have an image name property that is not NUL
terminated. Reject such images.

Reported-by: Mikhail Kshevetskiy <mikhail.kshevetskiy@iopsys.eu>
Signed-off-by: Heinrich Schuchardt <heinrich.schuchardt@canonical.com>
Tested-by: E Shattow <e@freeshell.de>
common/spl/spl_fit.c

index e250c11ebbd1c515e1380c569083908383b0083e..25f3c822a498f14b551d76322670a17d2b4942c2 100644 (file)
@@ -73,7 +73,7 @@ static int spl_fit_get_image_name(const struct spl_fit_info *ctx,
                                  const char **outname)
 {
        struct udevice *sysinfo;
-       const char *name, *str;
+       const char *name, *str, *end;
        __maybe_unused int node;
        int len, i;
        bool found = true;
@@ -83,11 +83,17 @@ static int spl_fit_get_image_name(const struct spl_fit_info *ctx,
                debug("cannot find property '%s': %d\n", type, len);
                return -EINVAL;
        }
+       /* A string property should be NUL terminated */
+       end = name + len - 1;
+       if (!len || *end) {
+               debug("malformed property '%s'\n", type);
+               return -EINVAL;
+       }
 
        str = name;
        for (i = 0; i < index; i++) {
                str = strchr(str, '\0') + 1;
-               if (!str || (str - name >= len)) {
+               if (str > end) {
                        found = false;
                        break;
                }