On Tue, 13 Jun 2023 00:34:37 +0000, Azeem Shaikh wrote: > strlcpy() reads the entire source buffer first. > This read may exceed the destination size limit. > This is both inefficient and can lead to linear read > overflows if a source string is not NUL-terminated [1]. > In an effort to remove strlcpy() completely [2], replace > strlcpy() here with strscpy(). > > [...] Since this got Acked and it's a trivial change, I'll take this via the hardening tree. Thanks! Applied to for-next/hardening, thanks! [1/1] netfilter: ipset: Replace strlcpy with strscpy https://git.kernel.org/kees/c/0b2fa86361f4 -- Kees Cook