[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20241029221641.15726-1-abdul.rahim@myyahoo.com>
Date: Wed, 30 Oct 2024 03:46:34 +0530
From: Abdul Rahim <abdul.rahim@...ahoo.com>
To: krzk@...nel.org
Cc: Abdul Rahim <abdul.rahim@...ahoo.com>,
netdev@...r.kernel.org,
linux-kernel@...r.kernel.org
Subject: [PATCH] nfc: s3fwrn5: Prefer strscpy() over strcpy()
strcpy() performs no bounds checking on the destination buffer. This
could result in linear overflows beyond the end of the buffer, leading
to all kinds of misbehaviors [1]
this fixes checkpatch warning:
WARNING: Prefer strscpy over strcpy
Link: https://www.kernel.org/doc/html/latest/process/deprecated.html#strcpy [1]
Signed-off-by: Abdul Rahim <abdul.rahim@...ahoo.com>
---
drivers/nfc/s3fwrn5/firmware.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/drivers/nfc/s3fwrn5/firmware.c b/drivers/nfc/s3fwrn5/firmware.c
index c20fdbac51c5..85fa84d93883 100644
--- a/drivers/nfc/s3fwrn5/firmware.c
+++ b/drivers/nfc/s3fwrn5/firmware.c
@@ -469,7 +469,7 @@ void s3fwrn5_fw_init(struct s3fwrn5_fw_info *fw_info, const char *fw_name)
fw_info->parity = 0x00;
fw_info->rsp = NULL;
fw_info->fw.fw = NULL;
- strcpy(fw_info->fw_name, fw_name);
+ strscpy(fw_info->fw_name, fw_name);
init_completion(&fw_info->completion);
}
--
2.46.0
Powered by blists - more mailing lists