[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id: <GDc.ZWft.5PWTByZfjjr.1TSxGQ@seznam.cz>
Date: Sat, 07 Sep 2019 15:43:54 +0200 (CEST)
From: <tomaspaukrt@...il.cz>
To: "Stephen Hemminger" <stephen@...workplumber.org>
Cc: <netdev@...r.kernel.org>
Subject: Re: iproute2: tc: potential buffer overflow
The updated patch is in the attachment.
---------- Původní e-mail ----------
Od: Stephen Hemminger <stephen@...workplumber.org>
Komu: tomaspaukrt@...il.cz
Datum: 31. 8. 2019 17:38:01
Předmět: Re: iproute2: tc: potential buffer overflow
On Sat, 31 Aug 2019 15:13:27 +0200 (CEST)
<tomaspaukrt@...il.cz> wrote:
> Hi,
>
> there are two potentially dangerous calls of strcpy function in the program "tc". In the attachment is a patch that fixes this issue.
>
> Tomas
This looks correct.
Please fix with strlcpy() instead; that is clearer.
Plus you can use XT_EXTENSION_MAX_NAMELEN here (optional).
View attachment "iproute2-overflow-fix.patch" of type "text/x-diff" (1076 bytes)
Powered by blists - more mailing lists