[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <519EBE2C.1010005@asianux.com>
Date: Fri, 24 May 2013 09:11:08 +0800
From: Chen Gang <gang.chen@...anux.com>
To: Pablo Neira Ayuso <pablo@...filter.org>
CC: kaber@...sh.net, kuznet@....inr.ac.ru, jmorris@...ei.org,
yoshfuji@...ux-ipv6.org, David Miller <davem@...emloft.net>,
netfilter-devel@...r.kernel.org, netfilter@...r.kernel.org,
coreteam@...filter.org, netdev <netdev@...r.kernel.org>
Subject: Re: [PATCH v2] ipv4: netfilter: always let NUL terminated string
ended by '\0'
On 05/23/2013 08:26 PM, Pablo Neira Ayuso wrote:
> On Thu, May 23, 2013 at 07:50:46PM +0800, Chen Gang wrote:
>> >
>> > For NUL terminated string, need always be sure of ended by '\0'.
>> >
>> > 'prefix' max length is 128 (NF_LOG_PREFIXLEN), and 'pm->prefix' max
>> > length is 32 (ULOG_PREFIX_LEN), so really need notice it.
>> >
>> > 'pm' is 'struct ulog_packet_msg_t' which may be copied to user mode
>> > (defined in "include/uapi/..."), so can not use strlcpy() instead of.
> That's fixing a real bug. We're passing strings that are longer than
> 32 bytes from nf_conntrack_tcp via nf_log, if ipt_ULOG is used, it
> will pass a non-null terminated string.
>
> I'm going to rework the patch description to include this and apply
> this patch.
>
> Thanks Chen.
>
>
Thank you too.
--
Chen Gang
Asianux Corporation
--
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists