Searched hist:e264b5573952c72805a14e69e438168c00163e9a (Results 1 – 6 of 6) sorted by relevance
| /rk3399_ARM-atf/plat/intel/soc/common/drivers/sdmmc/ |
| H A D | sdmmc.c | e264b5573952c72805a14e69e438168c00163e9a Sun Aug 25 23:59:10 UTC 2024 Sieu Mun Tang <sieu.mun.tang@intel.com> fix(intel): update memcpy to memcpy_s
memcpy does not check the dst_size which may create vulnerable issue as it can overflow the buffer. Using memcpy_s which check the dst_size will help to reduce the risk. Also, this memcpy is always 4 bytes each time.
Signed-off-by: Jit Loon Lim <jit.loon.lim@intel.com> Signed-off-by: Sieu Mun Tang <sieu.mun.tang@intel.com> Change-Id: I413e6ae2ee9330501703c4cd63b7943c6f55b4c7
|
| /rk3399_ARM-atf/plat/intel/soc/common/soc/ |
| H A D | socfpga_handoff.c | e264b5573952c72805a14e69e438168c00163e9a Sun Aug 25 23:59:10 UTC 2024 Sieu Mun Tang <sieu.mun.tang@intel.com> fix(intel): update memcpy to memcpy_s
memcpy does not check the dst_size which may create vulnerable issue as it can overflow the buffer. Using memcpy_s which check the dst_size will help to reduce the risk. Also, this memcpy is always 4 bytes each time.
Signed-off-by: Jit Loon Lim <jit.loon.lim@intel.com> Signed-off-by: Sieu Mun Tang <sieu.mun.tang@intel.com> Change-Id: I413e6ae2ee9330501703c4cd63b7943c6f55b4c7
|
| H A D | socfpga_mailbox.c | e264b5573952c72805a14e69e438168c00163e9a Sun Aug 25 23:59:10 UTC 2024 Sieu Mun Tang <sieu.mun.tang@intel.com> fix(intel): update memcpy to memcpy_s
memcpy does not check the dst_size which may create vulnerable issue as it can overflow the buffer. Using memcpy_s which check the dst_size will help to reduce the risk. Also, this memcpy is always 4 bytes each time.
Signed-off-by: Jit Loon Lim <jit.loon.lim@intel.com> Signed-off-by: Sieu Mun Tang <sieu.mun.tang@intel.com> Change-Id: I413e6ae2ee9330501703c4cd63b7943c6f55b4c7
|
| /rk3399_ARM-atf/plat/intel/soc/common/ |
| H A D | socfpga_vab.c | e264b5573952c72805a14e69e438168c00163e9a Sun Aug 25 23:59:10 UTC 2024 Sieu Mun Tang <sieu.mun.tang@intel.com> fix(intel): update memcpy to memcpy_s
memcpy does not check the dst_size which may create vulnerable issue as it can overflow the buffer. Using memcpy_s which check the dst_size will help to reduce the risk. Also, this memcpy is always 4 bytes each time.
Signed-off-by: Jit Loon Lim <jit.loon.lim@intel.com> Signed-off-by: Sieu Mun Tang <sieu.mun.tang@intel.com> Change-Id: I413e6ae2ee9330501703c4cd63b7943c6f55b4c7
|
| H A D | socfpga_psci.c | e264b5573952c72805a14e69e438168c00163e9a Sun Aug 25 23:59:10 UTC 2024 Sieu Mun Tang <sieu.mun.tang@intel.com> fix(intel): update memcpy to memcpy_s
memcpy does not check the dst_size which may create vulnerable issue as it can overflow the buffer. Using memcpy_s which check the dst_size will help to reduce the risk. Also, this memcpy is always 4 bytes each time.
Signed-off-by: Jit Loon Lim <jit.loon.lim@intel.com> Signed-off-by: Sieu Mun Tang <sieu.mun.tang@intel.com> Change-Id: I413e6ae2ee9330501703c4cd63b7943c6f55b4c7
|
| /rk3399_ARM-atf/plat/intel/soc/common/sip/ |
| H A D | socfpga_sip_fcs.c | e264b5573952c72805a14e69e438168c00163e9a Sun Aug 25 23:59:10 UTC 2024 Sieu Mun Tang <sieu.mun.tang@intel.com> fix(intel): update memcpy to memcpy_s
memcpy does not check the dst_size which may create vulnerable issue as it can overflow the buffer. Using memcpy_s which check the dst_size will help to reduce the risk. Also, this memcpy is always 4 bytes each time.
Signed-off-by: Jit Loon Lim <jit.loon.lim@intel.com> Signed-off-by: Sieu Mun Tang <sieu.mun.tang@intel.com> Change-Id: I413e6ae2ee9330501703c4cd63b7943c6f55b4c7
|