8d82557e4b
strlcpy() reads the entire source buffer first. This read may exceed the destination size limit. This is both inefficient and can lead to linear read overflows if a source string is not NUL-terminated [1]. In an effort to remove strlcpy() completely [2], replace strlcpy() here with strscpy(). No return values were used, so direct replacement is safe. [1] https://www.kernel.org/doc/html/latest/process/deprecated.html#strlcpy [2] https://github.com/KSPP/linux/issues/89 Signed-off-by: Azeem Shaikh <azeemshaikh38@gmail.com> Reviewed-by: Kees Cook <keescook@chromium.org> Signed-off-by: Kees Cook <keescook@chromium.org> Link: https://lore.kernel.org/r/20230517143130.1519941-1-azeemshaikh38@gmail.com |
||
---|---|---|
.. | ||
57xx_iscsi_constants.h | ||
57xx_iscsi_hsi.h | ||
bnx2i_hwi.c | ||
bnx2i_init.c | ||
bnx2i_iscsi.c | ||
bnx2i_sysfs.c | ||
bnx2i.h | ||
Kconfig | ||
Makefile |