From mboxrd@z Thu Jan 1 00:00:00 1970 From: Thomas Monjalon Subject: Re: [PATCH v2] app/test: fix sprintf with strlcat Date: Tue, 02 Apr 2019 02:37:50 +0200 Message-ID: <11514522.tD9ysAbmMG@xps> References: <1552475243-16215-1-git-send-email-pallantlax.poornima@intel.com> Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7Bit Cc: dev@dpdk.org, Aaron Conole , reshma.pattan@intel.com, ferruh.yigit@intel.com, bruce.richardson@intel.com, stephen@networkplumber.org, stable@dpdk.org To: Pallantla Poornima Return-path: In-Reply-To: List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org Sender: "dev" 13/03/2019 14:51, Aaron Conole: > Pallantla Poornima writes: > > > sprintf function is not secure as it doesn't check the length of string. > > More secure function strlcat is used. > > > > Fixes: 727909c592 ("app/test: introduce dynamic commands list") > > Cc: stable@dpdk.org > > > > Signed-off-by: Pallantla Poornima > > --- > > v2: Used strlcat to avoid buffer overflow. > > --- > > LGTM. > > Reviewed-by: Aaron Conole Applied, thanks