diff options
author | Jean Delvare <jdelvare@suse.de> | 2018-04-13 15:37:59 +0200 |
---|---|---|
committer | Jean Delvare <jdelvare@suse.de> | 2018-04-13 15:37:59 +0200 |
commit | 90fe6f8ff00a07641ca893d64f75ca22ce77cca2 (patch) | |
tree | c472ca195b90ec429c8b70997eb6d6638f6cd3c2 /include/linux/mod_devicetable.h | |
parent | 0adb32858b0bddf4ada5f364a84ed60b196dbcda (diff) | |
download | linux-90fe6f8ff00a07641ca893d64f75ca22ce77cca2.tar.gz linux-90fe6f8ff00a07641ca893d64f75ca22ce77cca2.tar.bz2 linux-90fe6f8ff00a07641ca893d64f75ca22ce77cca2.zip |
firmware: dmi_scan: Fix UUID length safety check
The test which ensures that the DMI type 1 structure is long enough
to hold the UUID is off by one. It would fail if the structure is
exactly 24 bytes long, while that's sufficient to hold the UUID.
I don't expect this bug to cause problem in practice because all
implementations I have seen had length 8, 25 or 27 bytes, in line
with the SMBIOS specifications. But let's fix it still.
Signed-off-by: Jean Delvare <jdelvare@suse.de>
Fixes: a814c3597a6b ("firmware: dmi_scan: Check DMI structure length")
Reviewed-by: Mika Westerberg <mika.westerberg@linux.intel.com>
Diffstat (limited to 'include/linux/mod_devicetable.h')
0 files changed, 0 insertions, 0 deletions