diff options
author | Andrew MacIntyre <andymac@bullseye.apana.org.au> | 2004-12-12 08:28:11 (GMT) |
---|---|---|
committer | Andrew MacIntyre <andymac@bullseye.apana.org.au> | 2004-12-12 08:28:11 (GMT) |
commit | d0278ec97ffd252094cf56ea00e40b3c6f442a7a (patch) | |
tree | 1d212cb1831173578517a8b5e932769fba4ee010 /PC/os2emx/getpathp.c | |
parent | 222d5b466b3c23a6100ee490551b5feb54946d70 (diff) | |
download | cpython-d0278ec97ffd252094cf56ea00e40b3c6f442a7a.zip cpython-d0278ec97ffd252094cf56ea00e40b3c6f442a7a.tar.gz cpython-d0278ec97ffd252094cf56ea00e40b3c6f442a7a.tar.bz2 |
OS/2 specific fixes related to SF bug # 1003471
Diffstat (limited to 'PC/os2emx/getpathp.c')
-rw-r--r-- | PC/os2emx/getpathp.c | 13 |
1 files changed, 12 insertions, 1 deletions
diff --git a/PC/os2emx/getpathp.c b/PC/os2emx/getpathp.c index 4a4c893..7bfd19e 100644 --- a/PC/os2emx/getpathp.c +++ b/PC/os2emx/getpathp.c @@ -132,7 +132,16 @@ ismodule(char *filename) return 0; } -/* guarantees buffer will never overflow MAXPATHLEN+1 bytes */ +/* Add a path component, by appending stuff to buffer. + buffer must have at least MAXPATHLEN + 1 bytes allocated, and contain a + NUL-terminated string with no more than MAXPATHLEN characters (not counting + the trailing NUL). It's a fatal error if it contains a string longer than + that (callers must be careful!). If these requirements are met, it's + guaranteed that buffer will still be a NUL-terminated string with no more + than MAXPATHLEN characters at exit. If stuff is too long, only as much of + stuff as fits will be appended. +*/ + static void join(char *buffer, char *stuff) { @@ -144,6 +153,8 @@ join(char *buffer, char *stuff) if (n > 0 && !is_sep(buffer[n-1]) && n < MAXPATHLEN) buffer[n++] = SEP; } + if (n > MAXPATHLEN) + Py_FatalError("buffer overflow in getpathp.c's joinpath()"); k = strlen(stuff); if (n + k > MAXPATHLEN) k = MAXPATHLEN - n; |