Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp10796598imu; Thu, 6 Dec 2018 06:59:02 -0800 (PST) X-Google-Smtp-Source: AFSGD/UPxl0VAWRWrBFqLZz2pEUG3K+HZI+kHQJXrmdkgQn5JTVuranXD6oAQUXqUHtjMOx4YpbG X-Received: by 2002:a65:514c:: with SMTP id g12mr24131672pgq.169.1544108342779; Thu, 06 Dec 2018 06:59:02 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1544108342; cv=none; d=google.com; s=arc-20160816; b=Ddj+4wgHyPyRhG2NlM7EWyp+GR6gA0EZ36d/DgODl7KFd5pf4hSKrlvrn23VS29xjE LZin3y4DuOh1uDCtINaBs0pY78Zoia6lq+m6b5WRrY6TKrQyxFgZ9KjV0HPaKH4161jq WinUzS+k+3m7Bokmf1qoX2OeTjUofW+L/Ttda+qtKHxLDrbXDHPnAmQyiqvevPm6tXVi IqC1XCSs/gQujp5ruPDfR5XPayzXH+og7DRCcStQ4u/Lwmt5GvRxYbfayKUI86G8Bssn A6GZQKA89Ok/cKbHYmg9LLrxomupZLXgaztaUm3H/I0Q6R83VEycqHY4FhROiowluzX1 hxjA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=BZDAMyPYs8/BwMxp+0JRfEdm3nVo64bMObX40T/bXng=; b=pD44gyEAFDUqiWwu5GYS28tL5dVDJAHFR5vWsMQ1YPVdBGAnwMDDKsei98C+H1iDTP aYtcIBFAP5tIVwa9kpYjiPsVRJtevnYl7hSNLq9utQm9g8D0ftPcHL1OqKtIGDPgx/x3 PxgxI9UDL+L09IOnLjcXJfq77FHSZZfQucWnWvONOy4S/wAgvEfqUBYFbMNAV2umRbdR IhPrMaHJBio3RxPEjyLvp2DE0L78RaJCCnssuOUOc+kSwQ5qo3W/v5hs91nSxOEMdjvQ 6r2usWrETruAguIOYg1da/GJYfZBprmpefJxIdYM6wO5yV3HCTJmo4XOyjpKYl/4+gbh JrQg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=hfb0Jpfb; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id f65si467258pfb.194.2018.12.06.06.58.47; Thu, 06 Dec 2018 06:59:02 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=hfb0Jpfb; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730451AbeLFOmU (ORCPT + 99 others); Thu, 6 Dec 2018 09:42:20 -0500 Received: from mail.kernel.org ([198.145.29.99]:46556 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730435AbeLFOmQ (ORCPT ); Thu, 6 Dec 2018 09:42:16 -0500 Received: from localhost (5356596B.cm-6-7b.dynamic.ziggo.nl [83.86.89.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 1545120892; Thu, 6 Dec 2018 14:42:14 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1544107335; bh=6O6Soa5x4KAAHHnJWQTHiVV+mkfWkwHvSivZNWPiVlY=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=hfb0Jpfbq+uPrUH6O4UPIDLngSQpTrfgNkq01Y78LdqsAmLLvq2yDlvAiDDaJxfZk QoS+4kGOQ4/mx8FKw0UsxmsbuHaEK4oMPhsEsI6fY3zQcBe9I/udErzx1T4tzHQ4Wo X1aXDYCBOMq5zxd1bwgUA+2+fhHMR52GMUeeOho0= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Sultan Alsawaf , "David S. Miller" Subject: [PATCH 4.14 08/55] ip_tunnel: Fix name string concatenate in __ip_tunnel_create() Date: Thu, 6 Dec 2018 15:38:42 +0100 Message-Id: <20181206143002.181267176@linuxfoundation.org> X-Mailer: git-send-email 2.19.2 In-Reply-To: <20181206143001.749982936@linuxfoundation.org> References: <20181206143001.749982936@linuxfoundation.org> User-Agent: quilt/0.65 X-stable: review X-Patchwork-Hint: ignore MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 4.14-stable review patch. If anyone has any objections, please let me know. ------------------ From: Sultan Alsawaf commit 000ade8016400d93b4d7c89970d96b8c14773d45 upstream. By passing a limit of 2 bytes to strncat, strncat is limited to writing fewer bytes than what it's supposed to append to the name here. Since the bounds are checked on the line above this, just remove the string bounds checks entirely since they're unneeded. Signed-off-by: Sultan Alsawaf Signed-off-by: David S. Miller Signed-off-by: Greg Kroah-Hartman --- net/ipv4/ip_tunnel.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) --- a/net/ipv4/ip_tunnel.c +++ b/net/ipv4/ip_tunnel.c @@ -261,8 +261,8 @@ static struct net_device *__ip_tunnel_cr } else { if (strlen(ops->kind) > (IFNAMSIZ - 3)) goto failed; - strlcpy(name, ops->kind, IFNAMSIZ); - strncat(name, "%d", 2); + strcpy(name, ops->kind); + strcat(name, "%d"); } ASSERT_RTNL();