[U-Boot] [PATCH 0/4] Buffer overruns in printf

Wolfgang Denk wd at denx.de
Sun Sep 25 22:04:15 CEST 2011


Dear Simon Glass,

In message <1316799532-20761-1-git-send-email-sjg at chromium.org> you wrote:
> The printf family of functions in U-Boot cannot deal with a situation where
> the caller provides a buffer which turns out to be too small for the format
> string. This can result in buffer overflows, stack overflows and other bad
> behavior.
> 
> This patch series tidies this up in the common vsprintf.c code, and also
> some network code (as an example of where this might lead).

What's the impact of this patch set on the memory footprint of typical
configurations?

Best regards,

Wolfgang Denk

-- 
DENX Software Engineering GmbH,     MD: Wolfgang Denk & Detlev Zundel
HRB 165235 Munich, Office: Kirchenstr.5, D-82194 Groebenzell, Germany
Phone: (+49)-8142-66989-10 Fax: (+49)-8142-66989-80 Email: wd at denx.de
                  Nail here --X-- for new monitor.


More information about the U-Boot mailing list