Blame SOURCES/0006-libxtables-Avoid-buffer-overrun-in-xtables_compatibl.patch

6ef253
From d3641eaed9ad19b74f3bababb3db53af0004488b Mon Sep 17 00:00:00 2001
6ef253
From: Phil Sutter <phil@nwl.cc>
6ef253
Date: Thu, 5 Dec 2019 13:57:18 +0100
6ef253
Subject: [PATCH] libxtables: Avoid buffer overrun in
6ef253
 xtables_compatible_revision()
6ef253
6ef253
The function is exported and accepts arbitrary strings as input. Calling
6ef253
strcpy() without length checks is not OK.
6ef253
6ef253
(cherry picked from commit f7d3dbb82e7ed94ccbf10cf70a3c7b3f3aaef1a1)
6ef253
Signed-off-by: Phil Sutter <psutter@redhat.com>
6ef253
---
6ef253
 libxtables/xtables.c | 3 ++-
6ef253
 1 file changed, 2 insertions(+), 1 deletion(-)
6ef253
6ef253
diff --git a/libxtables/xtables.c b/libxtables/xtables.c
6ef253
index 895f6988eaf57..777c2b08e9896 100644
6ef253
--- a/libxtables/xtables.c
6ef253
+++ b/libxtables/xtables.c
6ef253
@@ -856,7 +856,8 @@ int xtables_compatible_revision(const char *name, uint8_t revision, int opt)
6ef253
 
6ef253
 	xtables_load_ko(xtables_modprobe_program, true);
6ef253
 
6ef253
-	strcpy(rev.name, name);
6ef253
+	strncpy(rev.name, name, XT_EXTENSION_MAXNAMELEN - 1);
6ef253
+	rev.name[XT_EXTENSION_MAXNAMELEN - 1] = '\0';
6ef253
 	rev.revision = revision;
6ef253
 
6ef253
 	max_rev = getsockopt(sockfd, afinfo->ipproto, opt, &rev, &s);
6ef253
-- 
6ef253
2.24.0
6ef253