diff options
author | Kees Cook <keescook@chromium.org> | 2013-10-02 09:13:34 +0400 |
---|---|---|
committer | David S. Miller <davem@davemloft.net> | 2013-10-03 04:01:56 +0400 |
commit | 20928bd3f08afb036c096d9559d581926b895918 (patch) | |
tree | 08bcf584e90c96224052645497e87c38d3083949 | |
parent | c31eeaced22ce8bd61268a3c595d542bb38c0a4f (diff) | |
download | linux-20928bd3f08afb036c096d9559d581926b895918.tar.xz |
sparc: fix ldom_reboot buffer overflow harder
The length argument to strlcpy was still wrong. It could overflow the end of
full_boot_str by 5 bytes. Instead of strcat and strlcpy, just use snprint.
Reported-by: Brad Spengler <spender@grsecurity.net>
Signed-off-by: Kees Cook <keescook@chromium.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
-rw-r--r-- | arch/sparc/kernel/ds.c | 5 |
1 files changed, 2 insertions, 3 deletions
diff --git a/arch/sparc/kernel/ds.c b/arch/sparc/kernel/ds.c index 4d9ac8406f32..dff60abbea01 100644 --- a/arch/sparc/kernel/ds.c +++ b/arch/sparc/kernel/ds.c @@ -849,9 +849,8 @@ void ldom_reboot(const char *boot_command) if (boot_command && strlen(boot_command)) { unsigned long len; - strcpy(full_boot_str, "boot "); - strlcpy(full_boot_str + strlen("boot "), boot_command, - sizeof(full_boot_str)); + snprintf(full_boot_str, sizeof(full_boot_str), "boot %s", + boot_command); len = strlen(full_boot_str); if (reboot_data_supported) { |