Re: iproute2: tc: potential buffer overflow

2019-09-07 Thread tomaspaukrt
The updated patch is in the attachment. -- Původní e-mail -- Od: Stephen Hemminger Komu: tomaspau...@email.cz Datum: 31. 8. 2019 17:38:01 Předmět: Re: iproute2: tc: potential buffer overflow On Sat, 31 Aug 2019 15:13:27 +0200 (CEST) wrote: > Hi, > > there are two po

Re: iproute2: tc: potential buffer overflow

2019-08-31 Thread Stephen Hemminger
On Sat, 31 Aug 2019 15:13:27 +0200 (CEST) wrote: > Hi, > > there are two potentially dangerous calls of strcpy function in the program > "tc". In the attachment is a patch that fixes this issue. > > Tomas This looks correct. Please fix with strlcpy() instead; that is clearer. Plus you can us

iproute2: tc: potential buffer overflow

2019-08-31 Thread tomaspaukrt
Hi, there are two potentially dangerous calls of strcpy function in the program "tc". In the attachment is a patch that fixes this issue. Tomasdiff --git a/tc/m_ipt.c b/tc/m_ipt.c index cc95eab7..cb64380b 100644 --- a/tc/m_ipt.c +++ b/tc/m_ipt.c @@ -269,7 +269,8 @@ static int build_st(struct xta