Fix [ASAN][BUG] heap-buffer-overflow in sdbd 51/276151/1 accepted/tizen_6.5_unified accepted/tizen/6.5/unified/20220613.161509 submit/tizen_6.5/20220610.065214 submit/tizen_6.5/20220616.051131
authorDongkyun Son <dongkyun.s@samsung.com>
Tue, 7 Jun 2022 09:13:13 +0000 (18:13 +0900)
committerDongkyun Son <dongkyun.s@samsung.com>
Fri, 10 Jun 2022 06:49:21 +0000 (06:49 +0000)
Change-Id: I233898809080cce9915418a586873d9d65c7ea2b
Signed-off-by: Sungguk Na <sungguk.na@samsung.com>y
Signed-off-by: Dongkyun Son <dongkyun.s@samsung.com>
(cherry picked from commit 126f0f6f90d20db82570936aa9241fbd0943bfdd)

src/default_plugin_basic.c

index 8d6a1f4..b311a45 100755 (executable)
@@ -383,7 +383,9 @@ int verify_handle_by_plugin ( parameters* in, parameters* out )
     }
 
     //the data contains the string sample-echo followed by space and then the user string, hence checking for space.
-    if((in->array_of_parameter[0].v_string.data[11] == ' ')&&(!strncmp(in->array_of_parameter[0].v_string.data, "sample-echo", strlen("sample-echo")))) {
+    if((in->array_of_parameter[0].v_string.length >= 12) &&
+            (in->array_of_parameter[0].v_string.data[11] == ' ') &&
+            (!strncmp(in->array_of_parameter[0].v_string.data, "sample-echo", strlen("sample-echo")))) {
        out->array_of_parameter[0].type = type_int32;
        out->array_of_parameter[0].v_int32 = PLUGIN_RET_HANDLE;
     }