mailing list of musl libc
 help / color / mirror / code / Atom feed
* [musl] [PATCH] src: string: Replace unsafe strcpy with strncat in strcat()
@ 2025-02-16 17:39 Anton Moryakov
  2025-02-16 18:02 ` Rich Felker
  0 siblings, 1 reply; 5+ messages in thread
From: Anton Moryakov @ 2025-02-16 17:39 UTC (permalink / raw)
  To: musl; +Cc: Anton Moryakov

Static analyzer reported:
PROC_USE.VULNERABLE Use of vulnerable function 'strcpy' at strcat.c:5. This function is unsafe, use strncpy instead.

Corrections explained:
Replaced the vulnerable function strcpy with strncat in strcat()
to prevent potential buffer overflows.

Previous code:
    strcpy(dest + strlen(dest), src);

New code:
    strncat(dest, src, strlen(src));

This improves security but does not guarantee full buffer safety. 
For complete protection, dest_size should be explicitly checked

Triggers found by static analyzer Svace.

Signed-off-by: Anton Moryakov <ant.v.moryakov@gmail.com>

---
 src/string/strcat.c | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/src/string/strcat.c b/src/string/strcat.c
index 33f749b1..d341facf 100644
--- a/src/string/strcat.c
+++ b/src/string/strcat.c
@@ -2,6 +2,6 @@
 
 char *strcat(char *restrict dest, const char *restrict src)
 {
-	strcpy(dest + strlen(dest), src);
+    strncat(dest, src, strlen(src));
 	return dest;
 }
-- 
2.30.2


^ permalink raw reply	[flat|nested] 5+ messages in thread
* [musl] [PATCH] src: string: Replace unsafe strcpy with strncat in strcat()
@ 2025-02-16 17:39 Anton Moryakov
  0 siblings, 0 replies; 5+ messages in thread
From: Anton Moryakov @ 2025-02-16 17:39 UTC (permalink / raw)
  To: musl; +Cc: Anton Moryakov

Static analyzer reported:
PROC_USE.VULNERABLE Use of vulnerable function 'strcpy' at strcat.c:5. This function is unsafe, use strncpy instead.

Corrections explained:
Replaced the vulnerable function strcpy with strncat in strcat()
to prevent potential buffer overflows.

Previous code:
    strcpy(dest + strlen(dest), src);

New code:
    strncat(dest, src, strlen(src));

This improves security but does not guarantee full buffer safety. 
For complete protection, dest_size should be explicitly checked

Triggers found by static analyzer Svace.

Signed-off-by: Anton Moryakov <ant.v.moryakov@gmail.com>

---
 src/string/strcat.c | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/src/string/strcat.c b/src/string/strcat.c
index 33f749b1..d341facf 100644
--- a/src/string/strcat.c
+++ b/src/string/strcat.c
@@ -2,6 +2,6 @@
 
 char *strcat(char *restrict dest, const char *restrict src)
 {
-	strcpy(dest + strlen(dest), src);
+	strncat(dest, src, strlen(src));
 	return dest;
 }
-- 
2.30.2


^ permalink raw reply	[flat|nested] 5+ messages in thread

end of thread, other threads:[~2025-02-16 18:06 UTC | newest]

Thread overview: 5+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2025-02-16 17:39 [musl] [PATCH] src: string: Replace unsafe strcpy with strncat in strcat() Anton Moryakov
2025-02-16 18:02 ` Rich Felker
2025-02-16 18:03   ` Anton Moryakov
2025-02-16 18:06     ` Rich Felker
2025-02-16 17:39 Anton Moryakov

Code repositories for project(s) associated with this public inbox

	https://git.vuxu.org/mirror/musl/

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).