Prevent a stack overflow in fit_check_sign
authorMichael van der Westhuizen <michael@smart-africa.com>
Tue, 20 May 2014 13:58:58 +0000 (15:58 +0200)
committerTom Rini <trini@ti.com>
Thu, 5 Jun 2014 18:44:56 +0000 (14:44 -0400)
commit64375014c499528d9df5ee37f78844823a9d21f2
tree15cf1e98e94e488c8948d7939aa402be97b27fee
parent25308f45e11527cbfc7ff6d9dced7800e4b976e4
Prevent a stack overflow in fit_check_sign

It is trivial to crash fit_check_sign by invoking with an
absolute path in a deeply nested directory.  This is exposed
by vboot_test.sh.

Signed-off-by: Michael van der Westhuizen <michael@smart-africa.com>
Acked-by: Simon Glass <sjg@chromium.org>
tools/fit_check_sign.c