File: 0001-parse_config-limit-sscanf-s-size-to-avoid-buffer-ove.patch

package info (click to toggle)
psst 1.0-9
  • links: PTS
  • area: main
  • in suites: forky, sid
  • size: 240 kB
  • sloc: ansic: 1,704; makefile: 46
file content (30 lines) | stat: -rw-r--r-- 1,043 bytes parent folder | download | duplicates (2)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
From 11e346d477da9f52b7ebcbe987994b181fe630fb Mon Sep 17 00:00:00 2001
From: Colin Ian King <colin.i.king@gmail.com>
Date: Wed, 3 May 2023 11:20:36 +0100
Subject: [PATCH] parse_config: limit sscanf %s size to avoid buffer overflow
 in buf
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 8bit

Limit the sscanf %s scan size to 127 bytes (buf size - 1) to ensure
string and end of string marker '\0' can fit into the 128 byte buf
to avoid buffer overflow.

Signed-off-by: Colin Ian King <colin.i.king@gmail.com>
---
 src/parse_config.c | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

Index: psst-1.0/src/parse_config.c
===================================================================
--- psst-1.0.orig/src/parse_config.c
+++ psst-1.0/src/parse_config.c
@@ -280,7 +280,7 @@ int parse_cmd_config(int ac, char **av,
 			sscanf(optarg, "%d", &configp->duration);
 			break;
 		case 'C':
-			sscanf(optarg, "%s", buf);
+			sscanf(optarg, "%127s", buf);
 			if (set_cpu_mask(buf, configp) < 0)
 				return 0;
 			break;