BZ: 41666
Klocwork scan found a "Buffer Overflow in Bound String Copy" issue
in intel_scu_fw_update.c. This patch fix this issue.
Change-Id: Id328f616f079b42553ffc6cf1d50be3422880f9d
Signed-off-by: Li, Ning <ning.li@intel.com>
Reviewed-on: http://android.intel.com:8080/52601
Reviewed-by: Yang, Bin <bin.yang@intel.com>
Reviewed-by: Du, Alek <alek.du@intel.com>
Tested-by: Tang, HaifengX <haifengx.tang@intel.com>
Reviewed-by: buildbot <buildbot@intel.com>
Tested-by: buildbot <buildbot@intel.com>
static void cur_err(const char *err_info)
{
- strncpy(err_buf, err_info, sizeof(err_buf));
+ strncpy(err_buf, err_info, sizeof(err_buf) - 1);
}
static ssize_t write_dnx(struct file *file, struct kobject *kobj,