lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id: <174428054735.1712257.6284971422979346985.b4-ty@kernel.org>
Date: Thu, 10 Apr 2025 11:22:27 +0100
From: Lee Jones <lee@...nel.org>
To: Eddie James <eajames@...ux.ibm.com>, Lee Jones <lee@...nel.org>, 
 linux-leds@...r.kernel.org, linux-kernel@...r.kernel.org, 
 Andy Shevchenko <andriy.shevchenko@...ux.intel.com>
Cc: Pavel Machek <pavel@...nel.org>
Subject: Re: (subset) [PATCH v3 1/1] leds: pca955x: Avoid potential
 overflow when filling default_label

On Mon, 07 Apr 2025 18:13:26 +0300, Andy Shevchenko wrote:
> GCC compiler (Debian 14.2.0-17) is not happy about printing
> into a too short buffer (when build with `make W=1`):
> 
>   drivers/leds/leds-pca955x.c:554:33: note: ‘snprintf’ output between 2 and 12 bytes into a destination of size 8
> 
> Indeed, the buffer size is chosen based on some assumptions,
> while in general the assigned value might not fit (GCC can't
> prove it does).
> 
> [...]

Applied, thanks!

[1/1] leds: pca955x: Avoid potential overflow when filling default_label
      commit: 1463b1c5bb231a8d46dc9db1773a31167614f84b

--
Lee Jones [李琼斯]


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ