From: <sj...@sl...> - 2013-10-13 13:41:21
|
Hi there, Please review the following patch for wrjpgcom: sj@slinafirinne ~/jpeg-6b $ more wrjpgcom.patch 456c456 < strcpy(comment_arg, argv[argn]+1); --- > snprintf(comment_arg, sizeof comment_arg, "%s", argv[argn]+1); 466c466 < strcat(comment_arg, argv[argn]); --- > snprintf(comment_arg, sizeof comment_arg, "%s", argv[argn]); This patch replaces possible vulnerable function calls strcpy and strcat which do not perform bounds checking. Regards, Peter. |