Re: [PATCH net] net/x25: prevent a couple of overflows

2020-11-30 Thread Martin Schiller
On 2020-11-30 11:04, Dan Carpenter wrote: From: "kiyin(尹亮)" The .x25_addr[] address comes from the user and is not necessarily NUL terminated. This leads to a couple problems. The first problem is that the strlen() in x25_bind() can read beyond the end of the buffer. The second problem is mo

[PATCH net] net/x25: prevent a couple of overflows

2020-11-30 Thread Dan Carpenter
From: "kiyin(尹亮)" The .x25_addr[] address comes from the user and is not necessarily NUL terminated. This leads to a couple problems. The first problem is that the strlen() in x25_bind() can read beyond the end of the buffer. The second problem is more subtle and could result in memory corrupt