diff options
| author | Dmitry Vyukov <dvyukov@google.com> | 2023-02-15 15:39:45 +0100 |
|---|---|---|
| committer | Dmitry Vyukov <dvyukov@google.com> | 2023-02-16 10:24:54 +0100 |
| commit | 38b317a74b84fb45acb8891e518dee0a87435505 (patch) | |
| tree | f7bf7160dd6e6dd9df7e581fcbe769027d0a1e2f /sys/linux/test | |
| parent | 6be0f1f57faa36df4b215edbe2fcfdbbb6de9f6d (diff) | |
prog: reject escaping filenames during deserialization
We already try as hard as possible to not generate escaping (global) filenames.
However, it's possible we read them from the corpus if it happens to contain some.
Also check for escaping filenames during deserialization.
Fixes #3678
Diffstat (limited to 'sys/linux/test')
| -rw-r--r-- | sys/linux/test/gup_fast | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/sys/linux/test/gup_fast b/sys/linux/test/gup_fast index 73b2d2c0b..bc1ff55b9 100644 --- a/sys/linux/test/gup_fast +++ b/sys/linux/test/gup_fast @@ -7,7 +7,7 @@ r0 = openat$urandom(0xffffffffffffff9c, &AUTO='/dev/urandom\x00', 0x0, 0x0) read(r0, &(0x7f0000000000), 0x2000) close(r0) -r1 = openat(0xffffffffffffff9c, &AUTO='/proc/self/exe\x00', 0x105000, 0x0) +r1 = openat(0xffffffffffffff9c, &AUTO='./file1\x00', 0x105042, 0x1ff) read(r1, &(0x7f0000000000), 0x2000) close(r1) munmap(&(0x7f0000000000/0x2000), 0x2000) |
