Merge pull request #2939 from PwnVerse/patch-1
Fix potential out of bounds access in msc_disk.c
This commit is contained in:
@@ -192,6 +192,9 @@ int32_t tud_msc_read10_cb(uint8_t lun, uint32_t lba, uint32_t offset, void* buff
|
|||||||
// out of ramdisk
|
// out of ramdisk
|
||||||
if ( lba >= DISK_BLOCK_NUM ) return -1;
|
if ( lba >= DISK_BLOCK_NUM ) return -1;
|
||||||
|
|
||||||
|
// Check for overflow of offset + bufsize
|
||||||
|
if ( offset + bufsize >= DISK_BLOCK_SIZE ) return -1;
|
||||||
|
|
||||||
uint8_t const* addr = msc_disk[lba] + offset;
|
uint8_t const* addr = msc_disk[lba] + offset;
|
||||||
memcpy(buffer, addr, bufsize);
|
memcpy(buffer, addr, bufsize);
|
||||||
|
|
||||||
|
@@ -191,6 +191,8 @@ int32_t tud_msc_read10_cb(uint8_t lun, uint32_t lba, uint32_t offset, void* buff
|
|||||||
|
|
||||||
// out of ramdisk
|
// out of ramdisk
|
||||||
if ( lba >= DISK_BLOCK_NUM ) return -1;
|
if ( lba >= DISK_BLOCK_NUM ) return -1;
|
||||||
|
// Check for overflow of offset + bufsize
|
||||||
|
if ( offset + bufsize >= DISK_BLOCK_SIZE ) return -1;
|
||||||
|
|
||||||
uint8_t const* addr = msc_disk[lba] + offset;
|
uint8_t const* addr = msc_disk[lba] + offset;
|
||||||
memcpy(buffer, addr, bufsize);
|
memcpy(buffer, addr, bufsize);
|
||||||
|
Reference in New Issue
Block a user