From: Arne Redlich <arne.redlich@go...> - 2013-07-02 19:05:49
2013/6/25 Shivaram Upadhyayula <shivaram.u@...>:
> This was detected by Coverity Scan for the iet code which we use, but is
> relevant to trunk also.
> The problem is with the memcpy() in notify()
> memcpy(NLMSG_DATA(nlh), data, len);
> The data passed is struct iet_event but the len passed to notify() is
> NLMSG_SPACE() which can be greater than the sizeof(iet_event)
> Attached patch fixes this.
Thanks Shivaram. Applied with your "Signed-off-by" added (as discussed offlist).
Get latest updates about Open Source Projects, Conferences and News.