Len Baker 6c4857203f CIFS: Fix a potencially linear read overflow
[ Upstream commit f980d055a0f858d73d9467bb0b570721bbfcdfb8 ]

strlcpy() reads the entire source buffer first. This read may exceed the
destination size limit. This is both inefficient and can lead to linear
read overflows if a source string is not NUL-terminated.

Also, the strnlen() call does not avoid the read overflow in the strlcpy
function when a not NUL-terminated string is passed.

So, replace this block by a call to kstrndup() that avoids this type of
overflow and does the same.

Fixes: 066ce6899484d ("cifs: rename cifs_strlcpy_to_host and make it use new functions")
Signed-off-by: Len Baker <len.baker@gmx.com>
Reviewed-by: Paulo Alcantara (SUSE) <pc@cjr.nz>
Reviewed-by: Jeff Layton <jlayton@kernel.org>
Signed-off-by: Steve French <stfrench@microsoft.com>
Signed-off-by: Sasha Levin <sashal@kernel.org>
2021-09-15 09:50:43 +02:00
..
2021-09-08 08:49:01 +02:00
2020-10-16 11:11:22 -07:00
2021-07-14 16:55:59 +02:00
2021-09-08 08:49:01 +02:00
2021-09-15 09:50:41 +02:00
2021-08-04 12:46:40 +02:00
2021-09-08 08:49:01 +02:00
2021-07-14 16:56:12 +02:00
2020-09-10 14:03:31 -07:00
2021-07-19 09:44:51 +02:00
2020-10-23 11:33:41 -07:00
2020-10-23 11:33:41 -07:00
2020-10-24 12:40:18 -07:00
2020-08-27 16:06:47 -04:00