From: Seung-Woo Kim Date: Thu, 27 Jul 2017 03:13:22 +0000 (+0900) Subject: cmd: usbdown: remove overflow possiblity on fill_entity_usbdown() X-Git-Tag: submit/tizen/20170728.011806~5 X-Git-Url: http://review.tizen.org/git/?a=commitdiff_plain;h=305669dd9fd5034f2bc8843f786fbf9adf9a4417;p=platform%2Fkernel%2Fu-boot.git cmd: usbdown: remove overflow possiblity on fill_entity_usbdown() The file name parsed from dfu_alo_info can be longer than NAME_SIZE, so strcpy function has possiblity of overflow. Remove the possible overflow using strncpy with less length than NAME_SIZE. Change-Id: Ib70f539a810e553136421c7faa576144811c3112 Signed-off-by: Seung-Woo Kim --- diff --git a/cmd/usbdown.c b/cmd/usbdown.c index 23654281fb..0ee61e57d6 100644 --- a/cmd/usbdown.c +++ b/cmd/usbdown.c @@ -257,7 +257,7 @@ static void fill_entity_usbdown(char *interface, char *devstr) /* Parsing file name */ s = strsep(&setting, ";"); st = strsep(&s, " "); - strcpy(usbdown[i].name, st); + strncpy(usbdown[i].name, st, NAME_SIZE - 1); ret = usb_fill_entity(&usbdown[i], s, alt_num_count, interface, devstr);