You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The fixed 256-byte description_str will overflow for any reasonably sized data_size >= 128.
Max data_size is for OCP VU Event Data is 0xFF Dwords, so the buffer should be at least 1020 bytes + 1 for null. 1024 seems like a nice number for OCP.
But this method was added to utils.c in e9c2e8f and any caller could overflow this buffer. While making it larger for the current ocp-telemetry-decode.c use cases one should also prevent buffer overflows for all users.
The text was updated successfully, but these errors were encountered:
Buffer overflow encountered when parsing OCP telemetry data
The fixed 256-byte
description_str
will overflow for any reasonably sizeddata_size
>= 128.Max
data_size
is for OCP VU Event Data is 0xFF Dwords, so the buffer should be at least 1020 bytes + 1 for null. 1024 seems like a nice number for OCP.But this method was added to utils.c in e9c2e8f and any caller could overflow this buffer. While making it larger for the current ocp-telemetry-decode.c use cases one should also prevent buffer overflows for all users.
The text was updated successfully, but these errors were encountered: