The source project of this merge request has been removed.
ubusd: fix buffer overflow on invalid socket input
When invalid input is received, for example all zeroes, the value of the length field of the blob header can smaller than the size of the header itself. This was leading to allocation of too small buffer and the header being written beyond its end, resulting in heap corruption and crash on upcoming free() call. Handle this by rejecting the connection when invalid length is received.