Sorry for not following up here, I've been quite busy recently.
So there are two bugs here - the first one, strcat overflow, is solved by my test kernel or by your patch.
Though I am not sure it's totally correct, I'll raise my concern on mailing list.
The second bug, null pointer dereference, requires more investigation.
Sorry for not following up here, I've been quite busy recently.
So there are two bugs here - the first one, strcat overflow, is solved by my test kernel or by your patch.
Though I am not sure it's totally correct, I'll raise my concern on mailing list.
The second bug, null pointer dereference, requires more investigation.