Re: [PATCH RFC] [5/9] modpost: Fix a buffer overflow in modpost

2007-12-10 Thread Sam Ravnborg
On Mon, Dec 10, 2007 at 08:57:28PM +0100, Andi Kleen wrote: > On Monday 10 December 2007 20:32, Sam Ravnborg wrote: > > On Thu, Nov 22, 2007 at 03:43:10AM +0100, Andi Kleen wrote: > > > When passing an file name > 1k the stack could be overflowed. > > > Not really a security issue, but still better

Re: [PATCH RFC] [5/9] modpost: Fix a buffer overflow in modpost

2007-12-10 Thread Andi Kleen
On Monday 10 December 2007 20:32, Sam Ravnborg wrote: > On Thu, Nov 22, 2007 at 03:43:10AM +0100, Andi Kleen wrote: > > When passing an file name > 1k the stack could be overflowed. > > Not really a security issue, but still better plugged. > > Looks good. A s-o-b line again please. Signed-off-by:

Re: [PATCH RFC] [5/9] modpost: Fix a buffer overflow in modpost

2007-12-10 Thread Sam Ravnborg
On Thu, Nov 22, 2007 at 03:43:10AM +0100, Andi Kleen wrote: > > When passing an file name > 1k the stack could be overflowed. > Not really a security issue, but still better plugged. Looks good. A s-o-b line again please. Although I am not so happy with the ue of gcc extensions. Sam > >

[PATCH RFC] [5/9] modpost: Fix a buffer overflow in modpost

2007-11-21 Thread Andi Kleen
When passing an file name > 1k the stack could be overflowed. Not really a security issue, but still better plugged. --- scripts/mod/modpost.c |3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) Index: linux/scripts/mod/modpost.c =