From 69f772ed91f5b742ddc63055fac888de8a42d676 Mon Sep 17 00:00:00 2001 From: Juan Carlos Luciani Date: Thu, 1 Feb 2007 16:04:28 +0000 Subject: [PATCH] Fixed one-byte buffer overflow problem in memcpy found during code review. -This line, and those below, will be ignored-- M linux/get.c --- CASA-auth-token/client/library/mechanisms/krb5/linux/get.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/CASA-auth-token/client/library/mechanisms/krb5/linux/get.c b/CASA-auth-token/client/library/mechanisms/krb5/linux/get.c index 04ae03a2..26e965b5 100644 --- a/CASA-auth-token/client/library/mechanisms/krb5/linux/get.c +++ b/CASA-auth-token/client/library/mechanisms/krb5/linux/get.c @@ -296,7 +296,7 @@ AuthTokenIf_GetAuthToken( else { // The buffer provided is large enough, copy the data and return the actual size. - memcpy((void*) pTokenBuf, pEncodedToken, encodedTokenLen + 1); + memcpy((void*) pTokenBuf, pEncodedToken, encodedTokenLen); // Success retStatus = CASA_STATUS_SUCCESS;