[U-Boot] [PATCH 0/4] Buffer overruns in printf
Wolfgang Denk
wd at denx.de
Sun Sep 25 22:04:15 CEST 2011
Dear Simon Glass,
In message <1316799532-20761-1-git-send-email-sjg at chromium.org> you wrote:
> The printf family of functions in U-Boot cannot deal with a situation where
> the caller provides a buffer which turns out to be too small for the format
> string. This can result in buffer overflows, stack overflows and other bad
> behavior.
>
> This patch series tidies this up in the common vsprintf.c code, and also
> some network code (as an example of where this might lead).
What's the impact of this patch set on the memory footprint of typical
configurations?
Best regards,
Wolfgang Denk
--
DENX Software Engineering GmbH, MD: Wolfgang Denk & Detlev Zundel
HRB 165235 Munich, Office: Kirchenstr.5, D-82194 Groebenzell, Germany
Phone: (+49)-8142-66989-10 Fax: (+49)-8142-66989-80 Email: wd at denx.de
Nail here --X-- for new monitor.
More information about the U-Boot
mailing list