lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <aRV7KMU_I13osYbE@kekkonen.localdomain>
Date: Thu, 13 Nov 2025 08:31:04 +0200
From: Sakari Ailus <sakari.ailus@...ux.intel.com>
To: Mark Brown <broonie@...nel.org>
Cc: Greg KH <gregkh@...uxfoundation.org>, hariconscious@...il.com,
	cezary.rojewski@...el.com, liam.r.girdwood@...ux.intel.com,
	peter.ujfalusi@...ux.intel.com, yung-chuan.liao@...ux.intel.com,
	ranjani.sridharan@...ux.intel.com, kai.vehmanen@...ux.intel.com,
	pierre-louis.bossart@...ux.dev, perex@...ex.cz, tiwai@...e.com,
	amadeuszx.slawinski@...ux.intel.com, khalid@...nel.org,
	shuah@...nel.org, david.hunter.linux@...il.com,
	linux-sound@...r.kernel.org, linux-kernel@...r.kernel.org,
	stable@...r.kernel.org
Subject: Re: [PATCH v2] ASoC: Intel: avs: Fix potential buffer overflow by
 snprintf()

On Wed, Nov 12, 2025 at 07:33:51PM +0000, Mark Brown wrote:
> On Wed, Nov 12, 2025 at 02:20:19PM -0500, Greg KH wrote:
> 
> > Also please do not wrap lines of fixes tags.
> 
> Someone probably ought to teach checkpatch about that one, it moans
> about long lines without checking for Fixes: IIRC.

I can recall this issue, too... I checked how to reproduce and fix this but
it seems it's already done: I couldn't reproduce it. I'm getting this for
breaking a Fixes: line:

WARNING: Please use correct Fixes: style 'Fixes: <12 chars of sha1> ("<title line>")' - ie: 'Fixes: ...

It basically now checks the subject matches with the quoted string.

So all is well!

-- 
Sakari Ailus

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ