j
k
j a
j l
On 05-01-16, 11:31, Geert Uytterhoeven wrote:
Any chance an attacker can overflow name[] by providing a very long dev_opp->prop_name? Better safe than sorry: snprintf(name, sizeof(name), ...);
Any chance an attacker can overflow name[] by providing a very long dev_opp->prop_name?
Better safe than sorry:
snprintf(name, sizeof(name), ...);
Sent a patch to you..
Back to the thread
Back to the list