[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <1489650479.2097.9.camel@lesbg.com>
Date: Thu, 16 Mar 2017 09:47:59 +0200
From: Jonathan Dieter <jdieter@...bg.com>
To: linux-kernel@...r.kernel.org
Cc: Valentina Manea <valentina.manea.m@...il.com>,
Shuah Khan <shuah@...nel.org>,
Peter Senna Tschudin <peter.senna@...il.com>,
Greg Kroah-Hartman <gregkh@...uxfoundation.org>,
Krzysztof Opasiak <k.opasiak@...sung.com>,
"open list:USB OVER IP DRIVER" <linux-usb@...r.kernel.org>
Subject: Re: [PATCH v4 1/2] usbip: Fix-format-overflow
On Mon, 2017-02-27 at 10:31 +0200, Jonathan Dieter wrote:
> The usbip userspace tools call sprintf()/snprintf() and don't check for
> the return value which can lead the paths to overflow, truncating the
> final file in the path.
>
> More urgently, GCC 7 now warns that these aren't checked with
> -Wformat-overflow, and with -Werror enabled in configure.ac, that makes
> these tools unbuildable.
>
> This patch fixes these problems by replacing sprintf() with snprintf() in
> one place and adding checks for the return value of snprintf().
>
> > Reviewed-by: Peter Senna Tschudin <peter.senna@...il.com>
> > Signed-off-by: Jonathan Dieter <jdieter@...bg.com>
> ---
> Changes since v3
> * Cast sizeof to long unsigned when printing errors to fix building for 32-bit
> architectures
Just wanted to check if there's anything else I need to do to make this
ready?
Thanks,
Jonathan
Powered by blists - more mailing lists