Home
last modified time | relevance | path

Searched hist:e264b5573952c72805a14e69e438168c00163e9a (Results 1 – 6 of 6) sorted by relevance

/rk3399_ARM-atf/plat/intel/soc/common/drivers/sdmmc/
H A Dsdmmc.ce264b5573952c72805a14e69e438168c00163e9a Sun Aug 25 23:59:10 UTC 2024 Sieu Mun Tang <sieu.mun.tang@intel.com> fix(intel): update memcpy to memcpy_s

memcpy does not check the dst_size which may
create vulnerable issue as it can overflow the buffer.
Using memcpy_s which check the dst_size will help to
reduce the risk. Also, this memcpy is always 4 bytes
each time.

Signed-off-by: Jit Loon Lim <jit.loon.lim@intel.com>
Signed-off-by: Sieu Mun Tang <sieu.mun.tang@intel.com>
Change-Id: I413e6ae2ee9330501703c4cd63b7943c6f55b4c7
/rk3399_ARM-atf/plat/intel/soc/common/soc/
H A Dsocfpga_handoff.ce264b5573952c72805a14e69e438168c00163e9a Sun Aug 25 23:59:10 UTC 2024 Sieu Mun Tang <sieu.mun.tang@intel.com> fix(intel): update memcpy to memcpy_s

memcpy does not check the dst_size which may
create vulnerable issue as it can overflow the buffer.
Using memcpy_s which check the dst_size will help to
reduce the risk. Also, this memcpy is always 4 bytes
each time.

Signed-off-by: Jit Loon Lim <jit.loon.lim@intel.com>
Signed-off-by: Sieu Mun Tang <sieu.mun.tang@intel.com>
Change-Id: I413e6ae2ee9330501703c4cd63b7943c6f55b4c7
H A Dsocfpga_mailbox.ce264b5573952c72805a14e69e438168c00163e9a Sun Aug 25 23:59:10 UTC 2024 Sieu Mun Tang <sieu.mun.tang@intel.com> fix(intel): update memcpy to memcpy_s

memcpy does not check the dst_size which may
create vulnerable issue as it can overflow the buffer.
Using memcpy_s which check the dst_size will help to
reduce the risk. Also, this memcpy is always 4 bytes
each time.

Signed-off-by: Jit Loon Lim <jit.loon.lim@intel.com>
Signed-off-by: Sieu Mun Tang <sieu.mun.tang@intel.com>
Change-Id: I413e6ae2ee9330501703c4cd63b7943c6f55b4c7
/rk3399_ARM-atf/plat/intel/soc/common/
H A Dsocfpga_vab.ce264b5573952c72805a14e69e438168c00163e9a Sun Aug 25 23:59:10 UTC 2024 Sieu Mun Tang <sieu.mun.tang@intel.com> fix(intel): update memcpy to memcpy_s

memcpy does not check the dst_size which may
create vulnerable issue as it can overflow the buffer.
Using memcpy_s which check the dst_size will help to
reduce the risk. Also, this memcpy is always 4 bytes
each time.

Signed-off-by: Jit Loon Lim <jit.loon.lim@intel.com>
Signed-off-by: Sieu Mun Tang <sieu.mun.tang@intel.com>
Change-Id: I413e6ae2ee9330501703c4cd63b7943c6f55b4c7
H A Dsocfpga_psci.ce264b5573952c72805a14e69e438168c00163e9a Sun Aug 25 23:59:10 UTC 2024 Sieu Mun Tang <sieu.mun.tang@intel.com> fix(intel): update memcpy to memcpy_s

memcpy does not check the dst_size which may
create vulnerable issue as it can overflow the buffer.
Using memcpy_s which check the dst_size will help to
reduce the risk. Also, this memcpy is always 4 bytes
each time.

Signed-off-by: Jit Loon Lim <jit.loon.lim@intel.com>
Signed-off-by: Sieu Mun Tang <sieu.mun.tang@intel.com>
Change-Id: I413e6ae2ee9330501703c4cd63b7943c6f55b4c7
/rk3399_ARM-atf/plat/intel/soc/common/sip/
H A Dsocfpga_sip_fcs.ce264b5573952c72805a14e69e438168c00163e9a Sun Aug 25 23:59:10 UTC 2024 Sieu Mun Tang <sieu.mun.tang@intel.com> fix(intel): update memcpy to memcpy_s

memcpy does not check the dst_size which may
create vulnerable issue as it can overflow the buffer.
Using memcpy_s which check the dst_size will help to
reduce the risk. Also, this memcpy is always 4 bytes
each time.

Signed-off-by: Jit Loon Lim <jit.loon.lim@intel.com>
Signed-off-by: Sieu Mun Tang <sieu.mun.tang@intel.com>
Change-Id: I413e6ae2ee9330501703c4cd63b7943c6f55b4c7