From 86a404c6fb70c07b8c5997cbb3f84a4815d1a702 Mon Sep 17 00:00:00 2001 From: laforge Date: Sat, 1 Sep 2001 11:57:33 +0000 Subject: fixed possible string overflows --- kernel/ipt_ULOG.c | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) (limited to 'kernel') diff --git a/kernel/ipt_ULOG.c b/kernel/ipt_ULOG.c index ee2959f..ed4b437 100644 --- a/kernel/ipt_ULOG.c +++ b/kernel/ipt_ULOG.c @@ -21,7 +21,7 @@ * each nlgroup you are using, so the total kernel memory usage increases * by that factor. * - * $Id: ipt_ULOG.c,v 1.10 2001/04/19 17:35:53 laforge Exp $ + * $Id: ipt_ULOG.c,v 1.11 2001/04/20 01:54:29 laforge Exp $ */ #include @@ -182,7 +182,7 @@ static unsigned int ipt_ulog_target(struct sk_buff **pskb, pm->mark = (*pskb)->nfmark; pm->hook = hooknum; if (loginfo->prefix[0] != '\0') - strcpy(pm->prefix, loginfo->prefix); + strncpy(pm->prefix, loginfo->prefix, sizeof(pm->prefix)); else *(pm->prefix) = '\0'; @@ -194,12 +194,12 @@ static unsigned int ipt_ulog_target(struct sk_buff **pskb, } if (in) - strcpy(pm->indev_name, in->name); + strncpy(pm->indev_name, in->name, sizeof(pm->indev_name)); else pm->indev_name[0] = '\0'; if (out) - strcpy(pm->outdev_name, out->name); + strncpy(pm->outdev_name, out->name, sizeof(pm->outdev_name)); else pm->outdev_name[0] = '\0'; -- cgit v1.2.3