[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <2023110348-drained-tameness-b943@gregkh>
Date: Fri, 3 Nov 2023 06:53:29 +0100
From: Greg Kroah-Hartman <gregkh@...uxfoundation.org>
To: Philipp Stanner <pstanner@...hat.com>
Cc: Ian Abbott <abbotti@....co.uk>,
H Hartley Sweeten <hsweeten@...ionengravers.com>,
Ivan Orlov <ivan.orlov0322@...il.com>,
Benjamin Tissoires <benjamin.tissoires@...hat.com>,
linux-kernel@...r.kernel.org, Dave Airlie <airlied@...hat.com>
Subject: Re: [PATCH] drivers/comedi: copy userspace array safely
On Thu, Nov 02, 2023 at 08:08:49PM +0100, Philipp Stanner wrote:
> comedi_fops.c utilizes memdup_user() to copy a userspace array. This
> does not check for an overflow.
Is there potential for an overflow today?
>
> Use the new wrapper memdup_array_user() to copy the array more safely.
How about saying something like:
"Use the new function memdup_array_user() in case things change
in the future which would prevent overflows if something were to
change in the size of the structures".
Or something to the affect of "all is good today, but make it easy to be
correct in the future as well".
thanks,
greg k-h
Powered by blists - more mailing lists