From 69cb23cf6082af275e5e09779126fc265a9e158b Mon Sep 17 00:00:00 2001 From: Christian Beer Date: Wed, 21 Oct 2015 16:46:23 +0200 Subject: [PATCH] use safe_strcat to prevent buffer overflow fixes CID 27965 found by Coverity --- sched/feeder.cpp | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/sched/feeder.cpp b/sched/feeder.cpp index e1c420a6c2..0a638ee0a5 100644 --- a/sched/feeder.cpp +++ b/sched/feeder.cpp @@ -774,7 +774,7 @@ int main(int argc, char** argv) { exit(1); } strcat(mod_select_clause, " and workunit.appid in ("); - strncat(mod_select_clause, argv[i], sizeof(mod_select_clause)-25); + safe_strcat(mod_select_clause, argv[i]); strcat(mod_select_clause, ")"); } else if (is_arg(argv[i], "mod")) { if (!argv[i+1] || !argv[i+2]) {