Core: Fix a possible overflow in EXI_DeviceIPL
m_szBuffer has a size of 256, but addressable range is 0 - 255
This commit is contained in:
parent
6bd5fb3a67
commit
70ba8cfbc2
|
@ -275,7 +275,7 @@ void CEXIIPL::TransferByte(u8& _uByte)
|
||||||
{
|
{
|
||||||
if (_uByte != '\0')
|
if (_uByte != '\0')
|
||||||
m_szBuffer[m_count++] = _uByte;
|
m_szBuffer[m_count++] = _uByte;
|
||||||
if ((m_count >= 256) || (_uByte == 0xD))
|
if (m_count >= 255 || _uByte == 0xD)
|
||||||
{
|
{
|
||||||
m_szBuffer[m_count] = 0x00;
|
m_szBuffer[m_count] = 0x00;
|
||||||
NOTICE_LOG(OSREPORT, "%s", m_szBuffer);
|
NOTICE_LOG(OSREPORT, "%s", m_szBuffer);
|
||||||
|
|
Loading…
Reference in New Issue