Re: [PATCH v3] modpost: prevent stack buffer overflow in do_input_entry() and do_dmi_entry()
From: Nicolas Schier
Date: Wed May 06 2026 - 02:07:31 EST
On Tue, 05 May 2026 18:11:02 +0200, Hasan Basbunar wrote:
> Several functions in scripts/mod/file2alias.c build the module alias
> string by repeatedly appending into a fixed-size on-stack buffer:
>
> char alias[256] = {};
> ...
> sprintf(alias + strlen(alias), "%X,*", i);
>
> [...]
Applied to kbuild/linux.git (kbuild-fixes-unstable), thanks!
[1/1] modpost: prevent stack buffer overflow in do_input_entry() and do_dmi_entry()
https://git.kernel.org/kbuild/c/bdb0ab97
Please look out for regression or issue reports or other follow up
comments, as they may result in the patch/series getting dropped,
reverted or modified (e.g. trailers). Patches applied to the
kbuild-fixes-unstable branch are accepted pending wider testing in
linux-next and any post-commit review; they will generally be moved
to the kbuild-fixes branch in a week if no issues are found.
Best regards,
--
Nicolas