From a361d391601b82b4e9c1877f53c0dfe753febd43 Mon Sep 17 00:00:00 2001 From: Qiu Shumin Date: Mon, 25 Aug 2014 08:04:52 +0000 Subject: Append the terminating null character at the end of the string to avoid buffer overflow. Contributed-under: TianoCore Contribution Agreement 1.0 Signed-off-by: Qiu Shumin Reviewed-by: Fu Siyuan git-svn-id: https://svn.code.sf.net/p/edk2/code/trunk/edk2@15888 6f19259b-4bc3-4df7-8a09-765794883524 --- NetworkPkg/Application/IpsecConfig/Indexer.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) (limited to 'NetworkPkg/Application') diff --git a/NetworkPkg/Application/IpsecConfig/Indexer.c b/NetworkPkg/Application/IpsecConfig/Indexer.c index 1762bbeb58..9e066b1cb5 100644 --- a/NetworkPkg/Application/IpsecConfig/Indexer.c +++ b/NetworkPkg/Application/IpsecConfig/Indexer.c @@ -1,7 +1,7 @@ /** @file The implementation of construct ENTRY_INDEXER in IpSecConfig application. - Copyright (c) 2009 - 2010, Intel Corporation. All rights reserved.
+ Copyright (c) 2009 - 2014, Intel Corporation. All rights reserved.
This program and the accompanying materials are licensed and made available under the terms and conditions of the BSD License @@ -234,6 +234,7 @@ ConstructPadIndexer ( } Indexer->PadId.PeerIdValid = TRUE; + ZeroMem (Indexer->PadId.Id.PeerId, MAX_PEERID_LEN); StrnCpy ((CHAR16 *) Indexer->PadId.Id.PeerId, ValueStr, ARRAY_SIZE (Indexer->PadId.Id.PeerId) - 1); } } -- cgit v1.2.3