|
Message-ID: <20240324174702.GB32430@brightrain.aerifal.cx> Date: Sun, 24 Mar 2024 13:47:02 -0400 From: Rich Felker <dalias@...ifal.cx> To: Maks Mishin <maks.mishinfz@...il.com> Cc: musl@...ts.openwall.com Subject: Re: [PATCH] wcpcpy: Replace call of vulnerable function On Sun, Mar 24, 2024 at 08:07:32PM +0300, Maks Mishin wrote: > Use of vulnerable function 'wcscpy' at wcpcpy.c:5. > This function is unsafe, use 'wcsncpy' instead. > > Found by RASU JSC. > > Signed-off-by: Maks Mishin <maks.mishinFZ@...il.com> > --- > src/string/wcpcpy.c | 2 +- > 1 file changed, 1 insertion(+), 1 deletion(-) > > diff --git a/src/string/wcpcpy.c b/src/string/wcpcpy.c > index ef401343..53a29a99 100644 > --- a/src/string/wcpcpy.c > +++ b/src/string/wcpcpy.c > @@ -2,5 +2,5 @@ > > wchar_t *wcpcpy(wchar_t *restrict d, const wchar_t *restrict s) > { > - return wcscpy(d, s) + wcslen(s); > + return wcsncpy(d, s, sizeof d) + wcslen(s); > } > -- > 2.30.2 Also wrong for the exact same reasons as the sprintf one. Rich
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.