lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Wed, 4 Jul 2018 15:15:25 +0000 (UTC) From: Kalle Valo <kvalo@...eaurora.org> To: YueHaibing <yuehaibing@...wei.com> Cc: <simon@...kelleys.org.uk>, <linux-kernel@...r.kernel.org>, <netdev@...r.kernel.org>, <linux-wireless@...r.kernel.org>, <davem@...emloft.net>, <andy.shevchenko@...il.com>, YueHaibing <yuehaibing@...wei.com> Subject: Re: [v2] atmel: using strlcpy() to avoid possible buffer overflows YueHaibing <yuehaibing@...wei.com> wrote: > 'firmware' is a module param which may been longer than firmware_id, > so using strlcpy() to guard against overflows. Also priv is allocated > with zeroed memory,no need to set firmware_id[0] to '\0'. > > Signed-off-by: YueHaibing <yuehaibing@...wei.com> Patch applied to wireless-drivers-next.git, thanks. f9cbaeb52930 atmel: using strlcpy() to avoid possible buffer overflows -- https://patchwork.kernel.org/patch/10498009/ https://wireless.wiki.kernel.org/en/developers/documentation/submittingpatches
Powered by blists - more mailing lists