diff options
author | Heinrich Schuchardt <heinrich.schuchardt@canonical.com> | 2021-11-15 19:26:51 +0100 |
---|---|---|
committer | Heinrich Schuchardt <heinrich.schuchardt@canonical.com> | 2022-07-18 17:21:49 +0200 |
commit | 085cbdafca9c3d7bc2f27523a343f61db82f2ccb (patch) | |
tree | aac6a821e06f8f567979e47314fba75f73430de1 /common/cli_readline.c | |
parent | 26f6f7fb5c0651d65afdee6d8ed36063606179a8 (diff) |
pxe: simplify label_boot()
Coverity CID 131256 indicates a possible buffer overflow in label_boot().
This would only occur if the size of the downloaded file would exceed 4
GiB. But anyway we can simplify the code by using snprintf() and checking
the return value.
Addresses-Coverity-ID: 131256 ("Security best practices violations (STRING_OVERFLOW)")
Signed-off-by: Heinrich Schuchardt <heinrich.schuchardt@canonical.com>
Reviewed-by: Ramon Fried <rfried.dev@gmail.com>
Reviewed-by: Artem Lapkin <email2tema@gmail.com>
Diffstat (limited to 'common/cli_readline.c')
0 files changed, 0 insertions, 0 deletions