[OpenSIPS-Devel] [opensips] Critical security fixes: memory corruption, invalid read, null dereferences, overflows (#719)

Liviu Chircu notifications at github.com
Thu Jan 14 17:36:24 CET 2016


But it's still not NULL-terminated! Here's the proper fix:

```
size_t len = strlen(sec);
if (len > LONGKEYBUFF - 1)
    len = LONGKEYBUFF - 1;
strncpy(longkey, sec, len + 1);
```

---
Reply to this email directly or view it on GitHub:
https://github.com/OpenSIPS/opensips/pull/719#issuecomment-171693425
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.opensips.org/pipermail/devel/attachments/20160114/27b8383b/attachment.htm>


More information about the Devel mailing list