vhost: fix name not null terminated
Fix issue reported by Coverity. Coverity ID 124556 If the buffer is treated as a null terminated string in later operations, a buffer overflow or over-read may occur. In vhost_set_ifname: The string buffer may not have a null terminator if the source string's length is equal to the buffer size Fixes: 54292e9520e0 ("vhost: support ifname for vhost-user") Signed-off-by: Daniel Mrzyglod <danielx.t.mrzyglod@intel.com> Acked-by: Yuanhan Liu <yuanhan.liu@linux.intel.com>
This commit is contained in:
parent
56fe86f8dc
commit
a5e20775a7
@ -320,6 +320,7 @@ vhost_set_ifname(struct vhost_device_ctx ctx,
|
||||
sizeof(dev->ifname) : if_len;
|
||||
|
||||
strncpy(dev->ifname, if_name, len);
|
||||
dev->ifname[sizeof(dev->ifname) - 1] = '\0';
|
||||
}
|
||||
|
||||
|
||||
|
Loading…
x
Reference in New Issue
Block a user