diff options
author | Lukas Fleischer <calcurse@cryptocrack.de> | 2012-02-18 15:40:01 +0100 |
---|---|---|
committer | Lukas Fleischer <calcurse@cryptocrack.de> | 2012-02-18 16:00:18 +0100 |
commit | c17b535a33f9388e7eb183c3e1a0971259f4a5e6 (patch) | |
tree | 130e17a2b5abd48fd478f30ccf096e00ce5e6dfc /test/search-001.sh | |
parent | 9a8ea7ff91486b53511d49a1b1bb44d48a549018 (diff) | |
download | calcurse-c17b535a33f9388e7eb183c3e1a0971259f4a5e6.tar.gz calcurse-c17b535a33f9388e7eb183c3e1a0971259f4a5e6.zip |
Fix up strncat() usage
The last argument to strncat() should not be the total buffer length; it
should be the space remaining:
The strncat() function shall append not more than n bytes (a null
byte and bytes that follow it are not appended) from the array
pointed to by s2 to the end of the string pointed to by s1. The
initial byte of s2 overwrites the null byte at the end of s1. A
terminating null byte is always appended to the result.
This patch fixes a couple of potential buffer overflow vulnerabilities.
Signed-off-by: Lukas Fleischer <calcurse@cryptocrack.de>
Diffstat (limited to 'test/search-001.sh')
0 files changed, 0 insertions, 0 deletions