]> asedeno.scripts.mit.edu Git - linux.git/commit
staging: fbtft: Fix buffer overflow vulnerability
authorTobin C. Harding <me@tobin.cc>
Wed, 15 Feb 2017 03:27:23 +0000 (14:27 +1100)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Mon, 6 Mar 2017 08:16:59 +0000 (09:16 +0100)
commit8414fe11ba2ff2422c4b73bbef3b035a2562c88a
treee465234e548c8b8862bb41ab451afcc7703a4d94
parentca5af1f303d16cdf183354abffba46528b72a163
staging: fbtft: Fix buffer overflow vulnerability

Module copies a user supplied string (module parameter) into a buffer
using strncpy() and does not check that the buffer is null terminated.

Replace call to strncpy() with call to strlcpy() ensuring that the
buffer is null terminated.

Signed-off-by: Tobin C. Harding <me@tobin.cc>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
drivers/staging/fbtft/fbtft_device.c