From mboxrd@z Thu Jan 1 00:00:00 1970 From: Aaron Conole Subject: Re: [PATCH v2] app/test: fix sprintf with strlcat Date: Wed, 13 Mar 2019 09:51:29 -0400 Message-ID: References: <1552475243-16215-1-git-send-email-pallantlax.poornima@intel.com> Mime-Version: 1.0 Content-Type: text/plain Cc: dev@dpdk.org, reshma.pattan@intel.com, ferruh.yigit@intel.com, bruce.richardson@intel.com, stephen@networkplumber.org, stable@dpdk.org To: Pallantla Poornima Return-path: In-Reply-To: <1552475243-16215-1-git-send-email-pallantlax.poornima@intel.com> (Pallantla Poornima's message of "Wed, 13 Mar 2019 11:07:23 +0000") List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org Sender: "dev" Pallantla Poornima writes: > sprintf function is not secure as it doesn't check the length of string. > More secure function strlcat is used. > > Fixes: 727909c592 ("app/test: introduce dynamic commands list") > Cc: stable@dpdk.org > > Signed-off-by: Pallantla Poornima > --- > v2: Used strlcat to avoid buffer overflow. > --- LGTM. Reviewed-by: Aaron Conole