From 83304fedb464fe3f97db662ce3e07bd948b7b7d9 Mon Sep 17 00:00:00 2001 From: Amar Tumballi Date: Tue, 6 Nov 2018 22:47:41 +0530 Subject: all: fix the format string exceptions Currently, there are possibilities in few places, where a user-controlled (like filename, program parameter etc) string can be passed as 'fmt' for printf(), which can lead to segfault, if the user's string contains '%s', '%d' in it. While fixing it, makes sense to make the explicit check for such issues across the codebase, by making the format call properly. Fixes: CVE-2018-14661 Fixes: bz#1647666 Change-Id: Ib547293f2d9eb618594cbff0df3b9c800e88bde4 Signed-off-by: Amar Tumballi --- libglusterfs/src/run.h | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) (limited to 'libglusterfs/src/run.h') diff --git a/libglusterfs/src/run.h b/libglusterfs/src/run.h index dd19972d07e..76af95fd27f 100644 --- a/libglusterfs/src/run.h +++ b/libglusterfs/src/run.h @@ -81,8 +81,8 @@ runner_add_args(runner_t *runner, ...); * @param format printf style format specifier */ void -runner_argprintf(runner_t *runner, const char *format, ...); - +runner_argprintf(runner_t *runner, const char *format, ...) + __attribute__((__format__(__printf__, 2, 3))); /** * log a message about the command to be run. * -- cgit