On Mon, 1 Aug 2022 18:54:17 +0200, Takashi Iwai wrote: > this is a patch series to paper over the theoretical buffer overflow > that might be caused by snprintf(). snprintf() is notorious for its > behavior and the usage of a safer version, scnprintf(), is > recommended. > > > Takashi > > [...] Applied to https://git.kernel.org/pub/scm/linux/kernel/git/broonie/sound.git for-next Thanks! [1/3] ASoC: Intel: avs: Fix potential buffer overflow by snprintf() commit: ca3b7b9dc9bc1fa552f4697b7cccfa0258a44d00 [2/3] ASoC: SOF: debug: Fix potential buffer overflow by snprintf() commit: 1eb123ce985e6cf302ac6e3f19862d132d86fa8f [3/3] ASoC: SOF: Intel: hda: Fix potential buffer overflow by snprintf() commit: 94c1ceb043c1a002de9649bb630c8e8347645982 All being well this means that it will be integrated into the linux-next tree (usually sometime in the next 24 hours) and sent to Linus during the next merge window (or sooner if it is a bug fix), however if problems are discovered then the patch may be dropped or reverted. You may get further e-mails resulting from automated or manual testing and review of the tree, please engage with people reporting problems and send followup patches addressing any issues that are reported if needed. If any updates are required or you are submitting further changes they should be sent as incremental updates against current git, existing patches will not be replaced. Please add any relevant lists and maintainers to the CCs when replying to this mail. Thanks, Mark