]> git.droids-corp.org - dpdk.git/commitdiff
examples/l2fwd-crypto: fix string overflow
authorPablo de Lara <pablo.de.lara.guarch@intel.com>
Thu, 7 Apr 2016 13:23:09 +0000 (14:23 +0100)
committerThomas Monjalon <thomas.monjalon@6wind.com>
Thu, 7 Apr 2016 17:52:07 +0000 (19:52 +0200)
When parsing crypto device type, the string was being copied
with strcpy(), which could overflow the destination buffer
(which is 32 byte long), so snprintf() should be used instead.

This fixes coverity issue 124575:
/examples/l2fwd-crypto/main.c: 1005 in l2fwd_crypto_parse_args_long_options()
>>>     CID 124575:    (STRING_OVERFLOW)
>>>     You might overrun the 32 byte fixed-size string
"options->string_auth_algo" by copying "optarg" without checking the length.
1005    strcpy(options->string_auth_algo, optarg);

Fixes: 49f79e86480d ("examples/l2fwd-crypto: add missing string initialization")
Signed-off-by: Pablo de Lara <pablo.de.lara.guarch@intel.com>
Acked-by: Declan Doherty <declan.doherty@intel.com>
examples/l2fwd-crypto/main.c

index 182dc56ab5828735abd672d91500fdac55c6920c..d4e2d8de0ee4d19a1317de0f0250a067c9267c12 100644 (file)
@@ -1012,7 +1012,8 @@ l2fwd_crypto_parse_args_long_options(struct l2fwd_crypto_options *options,
        if (strcmp(lgopts[option_index].name, "cdev_type") == 0) {
                retval = parse_cryptodev_type(&options->type, optarg);
                if (retval == 0)
-                       strcpy(options->string_type, optarg);
+                       snprintf(options->string_type, MAX_STR_LEN,
+                               "%s", optarg);
                return retval;
        }