diff options
author | Dan Carpenter <[email protected]> | 2014-12-12 16:58:05 -0800 |
---|---|---|
committer | Linus Torvalds <[email protected]> | 2014-12-13 12:42:52 -0800 |
commit | b5c8afe5be51078a979d86ae5ae78c4ac948063d (patch) | |
tree | ba14dd243cc624d08e0381b1026a9b70c519b43d /lib/memory-notifier-error-inject.c | |
parent | ec72c666fb345ea5f21359b7bc063710ce558e39 (diff) |
decompress_bunzip2: off by one in get_next_block()
"origPtr" is used as an offset into the bd->dbuf[] array. That array is
allocated in start_bunzip() and has "bd->dbufSize" number of elements so
the test here should be >= instead of >.
Later we check "origPtr" again before using it as an offset so I don't
know if this bug can be triggered in real life.
Fixes: bc22c17e12c1 ('bzip2/lzma: library support for gzip, bzip2 and lzma decompression')
Signed-off-by: Dan Carpenter <[email protected]>
Cc: Alain Knaff <[email protected]>
Cc: Yinghai Lu <[email protected]>
Cc: "H. Peter Anvin" <[email protected]>
Signed-off-by: Andrew Morton <[email protected]>
Signed-off-by: Linus Torvalds <[email protected]>
Diffstat (limited to 'lib/memory-notifier-error-inject.c')
0 files changed, 0 insertions, 0 deletions