-
Committer:
Dustin Kirkland
-
Date:
2015-12-21 20:40:49 UTC
-
mfrom:
(868.1.1 ecryptfs)
-
Revision ID:
kirkland@ubuntu.com-20151221204049-y4dw7ayntn1xiwya
* src/daemon/main.c:
- Static analysis with Clang's scan-build shows that we can potentially
overflow the input buffer if the input is equal or more than the buffer
size. Need to guard against this by:
1. Only reading in input_size - 1 chars
2. Checking earlier on to see if input_size is value to insure that we
read in at least 1 char