The updated patch is in the attachment.
-- Původní e-mail --
Od: Stephen Hemminger
Komu: tomaspau...@email.cz
Datum: 31. 8. 2019 17:38:01
Předmět: Re: iproute2: tc: potential buffer overflow
On Sat, 31 Aug 2019 15:13:27 +0200 (CEST)
wrote:
> Hi,
>
> there are two po
On Sat, 31 Aug 2019 15:13:27 +0200 (CEST)
wrote:
> Hi,
>
> there are two potentially dangerous calls of strcpy function in the program
> "tc". In the attachment is a patch that fixes this issue.
>
> Tomas
This looks correct.
Please fix with strlcpy() instead; that is clearer.
Plus you can us
Hi,
there are two potentially dangerous calls of strcpy function in the program
"tc". In the attachment is a patch that fixes this issue.
Tomasdiff --git a/tc/m_ipt.c b/tc/m_ipt.c
index cc95eab7..cb64380b 100644
--- a/tc/m_ipt.c
+++ b/tc/m_ipt.c
@@ -269,7 +269,8 @@ static int build_st(struct xta