aboutsummaryrefslogtreecommitdiff
path: root/nx-X11/lib/X11/KeysymStr.c
diff options
context:
space:
mode:
authorAlan Coopersmith <alan.coopersmith@oracle.com>2013-02-16 10:42:23 -0800
committerUlrich Sibiller <uli42@gmx.de>2016-10-19 21:40:26 +0200
commitd31b81c1010b4259bb0caafdbd82483fabda787d (patch)
treecf22b086ce9a085a1bfd76db3433271964cc1628 /nx-X11/lib/X11/KeysymStr.c
parentd43f4c3980cb76f39167e18b20ccec23182ed582 (diff)
downloadnx-libs-d31b81c1010b4259bb0caafdbd82483fabda787d.tar.gz
nx-libs-d31b81c1010b4259bb0caafdbd82483fabda787d.tar.bz2
nx-libs-d31b81c1010b4259bb0caafdbd82483fabda787d.zip
Convert more sprintf calls to snprintf
You could analyze most of these and quickly recognize that there was no chance of buffer overflow already, but why make everyone spend time doing that when we can just make it obviously safe? Signed-off-by: Alan Coopersmith <alan.coopersmith@oracle.com> Backported-to-NX-by: Ulrich Sibiller <uli42@gmx.de>
Diffstat (limited to 'nx-X11/lib/X11/KeysymStr.c')
-rw-r--r--nx-X11/lib/X11/KeysymStr.c2
1 files changed, 1 insertions, 1 deletions
diff --git a/nx-X11/lib/X11/KeysymStr.c b/nx-X11/lib/X11/KeysymStr.c
index 797cf53bd..ba6c8450a 100644
--- a/nx-X11/lib/X11/KeysymStr.c
+++ b/nx-X11/lib/X11/KeysymStr.c
@@ -107,7 +107,7 @@ char *XKeysymToString(KeySym ks)
XrmQuark empty = NULLQUARK;
GRNData data;
- sprintf(buf, "%lX", ks);
+ snprintf(buf, sizeof(buf), "%lX", ks);
resval.addr = (XPointer)buf;
resval.size = strlen(buf) + 1;
data.name = (char *)NULL;