(sendcmd): Don't overflow buf[]. The bug was fairly harmless, because
the overflowing data comes from the local user.
This commit is contained in:
parent
bac5345914
commit
92a14cca4d
1 changed files with 7 additions and 4 deletions
|
@ -126,11 +126,14 @@ void
|
|||
sendcmd(int s, char *cmd, char *arg)
|
||||
{
|
||||
char buf[128];
|
||||
int cc;
|
||||
int len;
|
||||
int cc, len;
|
||||
|
||||
(void)sprintf(buf, "%s %s\n", cmd, arg != NULL ? arg : "");
|
||||
len = strlen(buf);
|
||||
len = snprintf(buf, sizeof(buf), "%s %s\n",
|
||||
cmd, arg != NULL ? arg : "");
|
||||
if (len >= (int)sizeof(buf)) {
|
||||
fprintf(stderr, "%s too long\n", cmd);
|
||||
exit(1);
|
||||
}
|
||||
cc = write(s, buf, len);
|
||||
if (cc < 0) {
|
||||
perror("sendcmd: write");
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue