Prevent buffer overflows when path is too long
Some buffers created with PATH_MAX length are not checked when being written, and can overflow if PATH_MAX is not big enough to hold the path. Replace those buffers by strbufs so that their size is automatically grown if necessary. They are created as static local variables to avoid reallocating memory on each call. Note that prefix_filename() returns this static buffer so each callers should copy or use the string immediately (this is currently true). Reported-by: Wataru Noguchi <wnoguchi.0727@gmail.com> Signed-off-by: Antoine Pelisse <apelisse@gmail.com> Signed-off-by: Junio C Hamano <gitster@pobox.com>
This commit is contained in:

committed by
Junio C Hamano

parent
d7aced95cd
commit
fc2b621454
@ -73,15 +73,16 @@ struct pair_order {
|
||||
static int match_order(const char *path)
|
||||
{
|
||||
int i;
|
||||
char p[PATH_MAX];
|
||||
static struct strbuf p = STRBUF_INIT;
|
||||
|
||||
for (i = 0; i < order_cnt; i++) {
|
||||
strcpy(p, path);
|
||||
while (p[0]) {
|
||||
strbuf_reset(&p);
|
||||
strbuf_addstr(&p, path);
|
||||
while (p.buf[0]) {
|
||||
char *cp;
|
||||
if (!fnmatch(order[i], p, 0))
|
||||
if (!fnmatch(order[i], p.buf, 0))
|
||||
return i;
|
||||
cp = strrchr(p, '/');
|
||||
cp = strrchr(p.buf, '/');
|
||||
if (!cp)
|
||||
break;
|
||||
*cp = 0;
|
||||
|
Reference in New Issue
Block a user