Blame SOURCES/0006-libxtables-Avoid-buffer-overrun-in-xtables_compatibl.patch

576484
From d3641eaed9ad19b74f3bababb3db53af0004488b Mon Sep 17 00:00:00 2001
576484
From: Phil Sutter <phil@nwl.cc>
576484
Date: Thu, 5 Dec 2019 13:57:18 +0100
576484
Subject: [PATCH] libxtables: Avoid buffer overrun in
576484
 xtables_compatible_revision()
576484
576484
The function is exported and accepts arbitrary strings as input. Calling
576484
strcpy() without length checks is not OK.
576484
576484
(cherry picked from commit f7d3dbb82e7ed94ccbf10cf70a3c7b3f3aaef1a1)
576484
Signed-off-by: Phil Sutter <psutter@redhat.com>
576484
---
576484
 libxtables/xtables.c | 3 ++-
576484
 1 file changed, 2 insertions(+), 1 deletion(-)
576484
576484
diff --git a/libxtables/xtables.c b/libxtables/xtables.c
576484
index 895f6988eaf57..777c2b08e9896 100644
576484
--- a/libxtables/xtables.c
576484
+++ b/libxtables/xtables.c
576484
@@ -856,7 +856,8 @@ int xtables_compatible_revision(const char *name, uint8_t revision, int opt)
576484
 
576484
 	xtables_load_ko(xtables_modprobe_program, true);
576484
 
576484
-	strcpy(rev.name, name);
576484
+	strncpy(rev.name, name, XT_EXTENSION_MAXNAMELEN - 1);
576484
+	rev.name[XT_EXTENSION_MAXNAMELEN - 1] = '\0';
576484
 	rev.revision = revision;
576484
 
576484
 	max_rev = getsockopt(sockfd, afinfo->ipproto, opt, &rev, &s);
576484
-- 
576484
2.24.0
576484