Fix stack-buffer-overflow issue which is detected by ASAN 82/282882/1
authorwn.jang <wn.jang@samsung.com>
Thu, 13 Oct 2022 02:16:23 +0000 (11:16 +0900)
committerTizen AI <ai.tzn.sec@samsung.com>
Thu, 13 Oct 2022 02:29:30 +0000 (11:29 +0900)
commit459016d587d5f538ab0a228f57cad8a179287113
treeef5ea802c4bc0b42c346bf563b109086c146858c
parentf0a2a9a35265b37a9e02e9c6363d63fcf4fac40b
Fix stack-buffer-overflow issue which is detected by ASAN

Cause: A buffer overflow occurs because 4 bytes access occurs
       when the value is changeed as it is converted to (int*)
       even though it is set as 1 byte pool variable.

Soluetion: Use bool* instead of int* is_system_cmd_valid.

This issue is described on code.sec.samsung.net/jira/browse/TSEVEN-2604

Change-Id: I4d8dae44234d4879b99c75296244018b45e85e69
server/vcd_server.c
server/vcd_server.h
server/vcd_tidl.c