common/spl: guard against buffer overflow in spl_fit_get_image_name()
authorHeinrich Schuchardt <heinrich.schuchardt@canonical.com>
Tue, 24 Jun 2025 15:34:31 +0000 (17:34 +0200)
committerTom Rini <trini@konsulko.com>
Thu, 26 Jun 2025 17:58:17 +0000 (11:58 -0600)
commit79f8f31d58dfcd2b3563c32f1cf1097cee4d7f76
tree0cc2926ca92003fb6f9e948b62a1b7affa07344d
parent6ef9a89c1da433108ac89deab58954c6e2b798ba
common/spl: guard against buffer overflow in spl_fit_get_image_name()

A malformed FIT image could have an image name property that is not NUL
terminated. Reject such images.

Reported-by: Mikhail Kshevetskiy <mikhail.kshevetskiy@iopsys.eu>
Signed-off-by: Heinrich Schuchardt <heinrich.schuchardt@canonical.com>
Tested-by: E Shattow <e@freeshell.de>
common/spl/spl_fit.c