summaryrefslogtreecommitdiff
path: root/common/cli_readline.c
diff options
context:
space:
mode:
authorHeinrich Schuchardt <heinrich.schuchardt@canonical.com>2021-11-15 19:26:51 +0100
committerHeinrich Schuchardt <heinrich.schuchardt@canonical.com>2022-07-18 17:21:49 +0200
commit085cbdafca9c3d7bc2f27523a343f61db82f2ccb (patch)
treeaac6a821e06f8f567979e47314fba75f73430de1 /common/cli_readline.c
parent26f6f7fb5c0651d65afdee6d8ed36063606179a8 (diff)
pxe: simplify label_boot()
Coverity CID 131256 indicates a possible buffer overflow in label_boot(). This would only occur if the size of the downloaded file would exceed 4 GiB. But anyway we can simplify the code by using snprintf() and checking the return value. Addresses-Coverity-ID: 131256 ("Security best practices violations (STRING_OVERFLOW)") Signed-off-by: Heinrich Schuchardt <heinrich.schuchardt@canonical.com> Reviewed-by: Ramon Fried <rfried.dev@gmail.com> Reviewed-by: Artem Lapkin <email2tema@gmail.com>
Diffstat (limited to 'common/cli_readline.c')
0 files changed, 0 insertions, 0 deletions