On 05-01-16, 11:31, Geert Uytterhoeven wrote: > Any chance an attacker can overflow name[] by providing a very long > dev_opp->prop_name? > > Better safe than sorry: > > snprintf(name, sizeof(name), ...);
Sent a patch to you.. -- viresh -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to [email protected] More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/

