diff options
author | Takashi Iwai <[email protected]> | 2022-08-01 18:54:18 +0200 |
---|---|---|
committer | Mark Brown <[email protected]> | 2022-08-05 12:57:22 +0100 |
commit | ca3b7b9dc9bc1fa552f4697b7cccfa0258a44d00 (patch) | |
tree | 1cd83f7f4f103b646d90747e3b32f7d72590af17 /lib/test_fortify/write_overflow-strncpy-src.c | |
parent | c0fc96fed7ffa3e58f58b9cdb7158b5c61e026a2 (diff) |
ASoC: Intel: avs: Fix potential buffer overflow by snprintf()
snprintf() returns the would-be-filled size when the string overflows
the given buffer size, hence using this value may result in a buffer
overflow (although it's unrealistic).
This patch replaces it with a safer version, scnprintf() for papering
over such a potential issue.
Fixes: f1b3b320bd65 ("ASoC: Intel: avs: Generic soc component driver")
Signed-off-by: Takashi Iwai <[email protected]>
Acked-by: Cezary Rojewski <[email protected]>
Link: https://lore.kernel.org/r/[email protected]
Signed-off-by: Mark Brown <[email protected]>
Diffstat (limited to 'lib/test_fortify/write_overflow-strncpy-src.c')
0 files changed, 0 insertions, 0 deletions