Return-Path: From: Andrei Emeltchenko To: linux-bluetooth@vger.kernel.org Subject: [PATCHv3 3/5] btproxy: Fix possible string overflow Date: Tue, 22 Dec 2015 15:32:25 +0200 Message-Id: <1450791147-13224-4-git-send-email-Andrei.Emeltchenko.news@gmail.com> In-Reply-To: <1450791147-13224-1-git-send-email-Andrei.Emeltchenko.news@gmail.com> References: <1448551424-18448-1-git-send-email-Andrei.Emeltchenko.news@gmail.com> <1450791147-13224-1-git-send-email-Andrei.Emeltchenko.news@gmail.com> Sender: linux-bluetooth-owner@vger.kernel.org List-ID: From: Andrei Emeltchenko Follow common practice when copying to fixed size buffer. --- tools/btproxy.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/tools/btproxy.c b/tools/btproxy.c index 1a3eb5e..ee4dadd 100644 --- a/tools/btproxy.c +++ b/tools/btproxy.c @@ -657,7 +657,7 @@ static int open_unix(const char *path) memset(&addr, 0, sizeof(addr)); addr.sun_family = AF_UNIX; - strcpy(addr.sun_path, path); + strncpy(addr.sun_path, path, sizeof(addr.sun_path)); if (bind(fd, (struct sockaddr *) &addr, sizeof(addr)) < 0) { perror("Failed to bind Unix server socket"); -- 2.5.0