On Wed, Jun 24, 2015 at 09:51:49AM +0200, Eric Leblond wrote: > A static array was used to read data and to write information in > it without checking the limit of the array. The result was a buffer > overflow when the line was longer than 1024. > > This patch now uses a allocated buffer to avoid the problem. Applied, thanks Eric. I have replaced malloc and free by xmalloc and xfree respectively. -- To unsubscribe from this list: send the line "unsubscribe netfilter-devel" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html