From: Stefan Weil Date: Mon, 30 Sep 2013 21:04:49 +0000 (+0200) Subject: qemu-char: Fix potential out of bounds access to local arrays X-Git-Tag: qemu-xen-4.5.0-rc1~434^2~4 X-Git-Url: http://xenbits.xensource.com/gitweb?a=commitdiff_plain;h=49aa4058ac6dd0081aaa45776f07c98df397ca5e;p=qemu-upstream-4.5-testing.git qemu-char: Fix potential out of bounds access to local arrays Latest gcc-4.8 supports a new option -fsanitize=address which activates an AddressSanitizer. This AddressSanitizer stops the QEMU system emulation very early because two character arrays of size 8 are potentially written with 9 bytes. Commit 6ea314d91439741e95772dfbab98b4135e04bebb added the code. There is no obvious reason why width or height could need 8 characters, so reduce it to 7 characters which together with the terminating '\0' fit into the arrays. Cc: qemu-stable Signed-off-by: Stefan Weil Reviewed-by: Alex Bennée Signed-off-by: Michael Tokarev --- diff --git a/qemu-char.c b/qemu-char.c index f7f5464b6..6d393e6a1 100644 --- a/qemu-char.c +++ b/qemu-char.c @@ -2989,11 +2989,11 @@ QemuOpts *qemu_chr_parse_compat(const char *label, const char *filename) if (strstart(filename, "vc", &p)) { qemu_opt_set(opts, "backend", "vc"); if (*p == ':') { - if (sscanf(p+1, "%8[0-9]x%8[0-9]", width, height) == 2) { + if (sscanf(p+1, "%7[0-9]x%7[0-9]", width, height) == 2) { /* pixels */ qemu_opt_set(opts, "width", width); qemu_opt_set(opts, "height", height); - } else if (sscanf(p+1, "%8[0-9]Cx%8[0-9]C", width, height) == 2) { + } else if (sscanf(p+1, "%7[0-9]Cx%7[0-9]C", width, height) == 2) { /* chars */ qemu_opt_set(opts, "cols", width); qemu_opt_set(opts, "rows", height);