zfs/cmd/zpool
Richard Yao e23ed1b330 Fix potential buffer overflow in zpool command
The ZPOOL_SCRIPTS_PATH environment variable can be passed here. This
allows for arbitrarily long strings to be passed to sprintf(), which can
overflow the buffer.

I missed this in my earlier audit of the codebase. CodeQL's
cpp/unbounded-write check caught this.

Reviewed-by: Damian Szuberski <szuberskidamian@gmail.com>
Reviewed-by: Alexander Motin <mav@FreeBSD.org>
Reviewed-by: Brian Behlendorf <behlendorf1@llnl.gov>
Signed-off-by: Richard Yao <richard.yao@alumni.stonybrook.edu>
Closes #14264
2023-01-19 12:50:36 -08:00
..
compatibility.d Add compatibility file sets (ZoL 0.6.1, 0.6.4, OpenZFS 2.1) 2021-04-07 13:24:08 -07:00
os FreeBSD boot code reminder after zpool upgrade 2021-06-09 13:05:34 -07:00
zpool.d Remove basename(1). Clean up/shorten some coreutils pipelines 2022-02-16 17:58:55 -08:00
.gitignore Add .gitignore files to exclude build products 2010-01-08 11:35:17 -08:00
Makefile.am Rescan enclosure sysfs path on import 2021-11-02 16:31:05 -07:00
zpool_iter.c Rescan enclosure sysfs path on import 2021-11-02 16:31:05 -07:00
zpool_main.c Fix potential buffer overflow in zpool command 2023-01-19 12:50:36 -08:00
zpool_util.c OpenZFS restructuring - zpool 2019-09-30 12:16:06 -07:00
zpool_util.h Rescan enclosure sysfs path on import 2021-11-02 16:31:05 -07:00
zpool_vdev.c Fix various typos 2021-04-07 13:27:11 -07:00