-
Committer:
Colin King
-
Date:
2015-12-16 19:07:11 UTC
-
mto:
This revision was merged to the branch mainline in
revision
869.
-
Revision ID:
colin.king@canonical.com-20151216190711-g513v7bs52r0kxok
* src/daemon/main.c
daemon: ensure we don't overflow input buffer. We must only read in
input_size - 1 chars else the following input[r] = '\0' will fall outside
the input buffer if a full buffer is read. Also, the buffer needs to be
at least 2 chars in length, less than that we get a zero length read which
is illegal.