mirror of
https://github.com/SerenityOS/serenity.git
synced 2025-01-24 10:22:05 -05:00
00f658b984
If a buffer smaller than Elf32_Ehdr was passed to Image, header() would do an out-of-bounds read. Make parse() check for that. Make most Image methods assert that the image is_valid(). For that to work, set m_valid early in Image::parse() instead of only at its end. Also reorder a few things so that the fuzzer doesn't hit (valid) assertions, which were harmless from a security PoV but which still allowed userspace to crash the kernel with an invalid ELF file. Make dbgprintf()s configurable at run time so that the fuzzer doesn't produce lots of logspam. |
||
---|---|---|
.. | ||
CLion | ||
Lagom | ||
bochsrc | ||
build-image-grub.sh | ||
build-image-qemu.sh | ||
build-root-filesystem.sh | ||
check-style.sh | ||
debug-kernel.sh | ||
grub-ebr.cfg | ||
grub-gpt.cfg | ||
grub-mbr.cfg | ||
lint-executable-resources.sh | ||
lint-missing-resources.sh | ||
lint-shell-scripts.sh | ||
refresh-serenity-qtcreator.sh | ||
run.sh | ||
screenshot-000ccc0.png | ||
screenshot-8ea4375.png | ||
screenshot-1133aca.png | ||
screenshot-9145a72.png | ||
screenshot-23263aa.png | ||
screenshot-191112e.png | ||
screenshot-b5521e1.png | ||
screenshot-cdb82f6.png | ||
screenshot-d727005.png | ||
screenshot-ef9fbef.png | ||
screenshot-f8fc892.png | ||
write-only-on-difference.sh |