Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp10792005imu; Thu, 6 Dec 2018 06:54:24 -0800 (PST) X-Google-Smtp-Source: AFSGD/WBdvT7DzqBKIooCjnRn8AG06furGpL7uUY2T8HiqgXF23BJ7HPXvH+nby9FYDyHu1n4pkN X-Received: by 2002:a62:5c1:: with SMTP id 184mr28628389pff.165.1544108064147; Thu, 06 Dec 2018 06:54:24 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1544108064; cv=none; d=google.com; s=arc-20160816; b=UFk+tDIxuXzhjAYnvUJtmGW/mGZwXHzOqHeXB9MpIxmR5nscamoXTpRJ5eRaTghl5n vAbsgJS0K9fCXcVOpIuVhwPrliH+P/VI+8Nh2K3xV6YQdsLvSBiN6PnY1UFzlgy25VwM 3HLx4GRLRDdKiXYDUuLFRpJC9zAoy96AdqZ51VfyFl3ixdbeZoMZDkrBwOZAgs8ph+M6 yeI1yglqH8E/VK8LuKWpvGhCrFgVNjg05Wn4tY9HsBiH7lMdObMGgxhWhzf9mW5jYo2K 5CMoIlfz7gvaUCEFB34b8Xki6AfhNjapM1X/cT5Tc08fs2nx4kfDOsVUfu8wN+sx6/Ik SVTQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=Vq54VJACmh07wYppr3NQtziKmtrAYe5d61MW0Ak2mAg=; b=cpyQLsoC/qufzfkbpz2BZYgpMZbpjX/vTZiln8pEK5BSbD+9MP9u/PygVTc8E3gmXG 61a1bJkAR3qUqb9zskk2XZ0AeZgjTQJ0mOfJr68XpbzR4N/Fdds4vHNlPTrd/1jeaTkB tdSYvdb+jEjDVDCCO5OecoEj95Pt1+cBJMs+nasPX+LWVATlnbOGBx59P4ogcTmwES0g LvJvTRsIeUubpI/eTe2VluLP+2RLXAQrVxwSABMTZqmOOc+IzaJFrvt8G1Ty2Y2Rpz6P 9FVSX4bP5MKzvefN6JvYpc9xyw2guR/X0HABrESIlDwk1pJI0SNjnOSwSeW5BmPG4p4/ aSfQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=oDqwPfHG; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id o6si433527plh.23.2018.12.06.06.54.08; Thu, 06 Dec 2018 06:54:24 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=oDqwPfHG; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726019AbeLFOx0 (ORCPT + 99 others); Thu, 6 Dec 2018 09:53:26 -0500 Received: from mail.kernel.org ([198.145.29.99]:50130 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1731039AbeLFOp0 (ORCPT ); Thu, 6 Dec 2018 09:45:26 -0500 Received: from localhost (5356596B.cm-6-7b.dynamic.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 87D5C20892; Thu, 6 Dec 2018 14:45:25 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1544107526; bh=tKyOmMG0DXVaPs+cFexGrbea1fbDg/Qmx+THbeRCPAI=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=oDqwPfHGwDO3MtIoD4Siy0E5ukf6AM/Zu1YjQH3lPkLkBHnpAaKJ7RVQCZ2kGzIsy C3Az+mOou8PKUELCMurdCeGbO1k4zIHxUXR1c5dD/TRwbjVUvr0t/lM3A9aOoCFRvI jsBYG/JpSXtPvKfJ0j5yfvEtgJqga7XBLCLpCZhs= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Sultan Alsawaf , "David S. Miller" Subject: [PATCH 4.9 007/101] ip_tunnel: Fix name string concatenate in __ip_tunnel_create() Date: Thu, 6 Dec 2018 15:38:06 +0100 Message-Id: <20181206143012.027549735@linuxfoundation.org> X-Mailer: git-send-email 2.19.2 In-Reply-To: <20181206143011.174892052@linuxfoundation.org> References: <20181206143011.174892052@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.9-stable review patch. If anyone has any objections, please let me know. ------------------ From: Sultan Alsawaf commit 000ade8016400d93b4d7c89970d96b8c14773d45 upstream. By passing a limit of 2 bytes to strncat, strncat is limited to writing fewer bytes than what it's supposed to append to the name here. Since the bounds are checked on the line above this, just remove the string bounds checks entirely since they're unneeded. Signed-off-by: Sultan Alsawaf Signed-off-by: David S. Miller Signed-off-by: Greg Kroah-Hartman --- net/ipv4/ip_tunnel.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) --- a/net/ipv4/ip_tunnel.c +++ b/net/ipv4/ip_tunnel.c @@ -261,8 +261,8 @@ static struct net_device *__ip_tunnel_cr } else { if (strlen(ops->kind) > (IFNAMSIZ - 3)) goto failed; - strlcpy(name, ops->kind, IFNAMSIZ); - strncat(name, "%d", 2); + strcpy(name, ops->kind); + strcat(name, "%d"); } ASSERT_RTNL();