2015-11-30 13:32:17

by Andrei Emeltchenko

[permalink] [raw]
Subject: [PATCH] btproxy: Fix possible string overflow

From: Andrei Emeltchenko <[email protected]>

Follow common practice when copying to fixed size buffer.
---
tools/btproxy.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/tools/btproxy.c b/tools/btproxy.c
index 1a3eb5e..ee4dadd 100644
--- a/tools/btproxy.c
+++ b/tools/btproxy.c
@@ -657,7 +657,7 @@ static int open_unix(const char *path)

memset(&addr, 0, sizeof(addr));
addr.sun_family = AF_UNIX;
- strcpy(addr.sun_path, path);
+ strncpy(addr.sun_path, path, sizeof(addr.sun_path));

if (bind(fd, (struct sockaddr *) &addr, sizeof(addr)) < 0) {
perror("Failed to bind Unix server socket");
--
2.5.0