Len Baker 20967547ff CIFS: Fix a potencially linear read overflow
[ Upstream commit f980d055a0f858d73d9467bb0b570721bbfcdfb8 ]

strlcpy() reads the entire source buffer first. This read may exceed the
destination size limit. This is both inefficient and can lead to linear
read overflows if a source string is not NUL-terminated.

Also, the strnlen() call does not avoid the read overflow in the strlcpy
function when a not NUL-terminated string is passed.

So, replace this block by a call to kstrndup() that avoids this type of
overflow and does the same.

Fixes: 066ce6899484d ("cifs: rename cifs_strlcpy_to_host and make it use new functions")
Signed-off-by: Len Baker <len.baker@gmx.com>
Reviewed-by: Paulo Alcantara (SUSE) <pc@cjr.nz>
Reviewed-by: Jeff Layton <jlayton@kernel.org>
Signed-off-by: Steve French <stfrench@microsoft.com>
Signed-off-by: Sasha Levin <sashal@kernel.org>
2021-09-22 11:45:22 +02:00
..
2020-11-05 11:07:03 +01:00
2020-04-02 16:34:33 +02:00
2019-08-06 19:05:23 +02:00
2021-07-20 16:17:33 +02:00
2020-08-21 09:48:18 +02:00
2021-09-22 11:45:15 +02:00
2021-07-20 16:17:45 +02:00
2021-08-04 12:22:15 +02:00
2021-06-30 08:48:55 -04:00
2018-12-21 14:13:04 +01:00
2020-03-11 18:02:43 +01:00
2020-04-02 16:34:21 +02:00