Re: [PATCH] staging: fbtft: Fix buffer overflow vulnerability

2017-02-14 Thread Greg Kroah-Hartman
On Wed, Feb 15, 2017 at 11:42:54AM +1100, Tobin C. Harding wrote: > Module copies a user supplied string (module parameter) into a buffer > using strncpy() and does not check that the buffer is null terminated. > > Replace call to strncpy() with call to strlcpy() ensuring that the > buffer is null

[PATCH] staging: fbtft: Fix buffer overflow vulnerability

2017-02-14 Thread Tobin C. Harding
Module copies a user supplied string (module parameter) into a buffer using strncpy() and does not check that the buffer is null terminated. Replace call to strncpy() with call to strlcpy() ensuring that the buffer is null terminated. Signed-off-by: Tobin C. Harding --- drivers/staging/fbtft/fb