commit | 4c559f15efcc43b996f4da528cd7f9483aaca36d | [log] [tgz] |
---|---|---|
author | Pablo Neira Ayuso <pablo@netfilter.org> | Thu May 14 14:14:23 2020 +0200 |
committer | Pablo Neira Ayuso <pablo@netfilter.org> | Mon May 25 20:39:14 2020 +0200 |
tree | a6a8ccd47c3fc1afdac3c51f6380d3a6ca1b7c19 | |
parent | a164b95ad6055c50612795882f35e0efda1f1390 [diff] |
netfilter: nf_conntrack_pptp: prevent buffer overflows in debug code Dan Carpenter says: "Smatch complains that the value for "cmd" comes from the network and can't be trusted." Add pptp_msg_name() helper function that checks for the array boundary. Fixes: f09943fefe6b ("[NETFILTER]: nf_conntrack/nf_nat: add PPTP helper port") Reported-by: Dan Carpenter <dan.carpenter@oracle.com> Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>