diff options
author | Alan Coopersmith <alan.coopersmith@oracle.com> | 2013-02-16 10:42:23 -0800 |
---|---|---|
committer | Ulrich Sibiller <uli42@gmx.de> | 2016-10-19 21:40:26 +0200 |
commit | d31b81c1010b4259bb0caafdbd82483fabda787d (patch) | |
tree | cf22b086ce9a085a1bfd76db3433271964cc1628 /nx-X11/lib/X11/KeysymStr.c | |
parent | d43f4c3980cb76f39167e18b20ccec23182ed582 (diff) | |
download | nx-libs-d31b81c1010b4259bb0caafdbd82483fabda787d.tar.gz nx-libs-d31b81c1010b4259bb0caafdbd82483fabda787d.tar.bz2 nx-libs-d31b81c1010b4259bb0caafdbd82483fabda787d.zip |
Convert more sprintf calls to snprintf
You could analyze most of these and quickly recognize that there was no
chance of buffer overflow already, but why make everyone spend time doing
that when we can just make it obviously safe?
Signed-off-by: Alan Coopersmith <alan.coopersmith@oracle.com>
Backported-to-NX-by: Ulrich Sibiller <uli42@gmx.de>
Diffstat (limited to 'nx-X11/lib/X11/KeysymStr.c')
-rw-r--r-- | nx-X11/lib/X11/KeysymStr.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/nx-X11/lib/X11/KeysymStr.c b/nx-X11/lib/X11/KeysymStr.c index 797cf53bd..ba6c8450a 100644 --- a/nx-X11/lib/X11/KeysymStr.c +++ b/nx-X11/lib/X11/KeysymStr.c @@ -107,7 +107,7 @@ char *XKeysymToString(KeySym ks) XrmQuark empty = NULLQUARK; GRNData data; - sprintf(buf, "%lX", ks); + snprintf(buf, sizeof(buf), "%lX", ks); resval.addr = (XPointer)buf; resval.size = strlen(buf) + 1; data.name = (char *)NULL; |