On Sat, 2 Mar 2024 19:41:02 -0800, Digital Man -> Accession wrote:
Use of strcpy() in general is considered unsafe. But that's not the same issue that apam posted about (overlapping source and destination
string). The example use of strcpy() above may be fine or may not, depending on the size of the 'addr' buffer and the length string at originbuf + d + 1.
I believe we have changed those to memmove() like you stated in your
previous post.
Carlos has a fork available on github for Jamnntpd off the original
master branch, and I will be working on one for Smapinntpd in the near
future. Both of them will include all of these changes, as well as some
others.
Regards,
Nick
... "Take my advice, I don't use it anyway."
--- Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:115.0) Gecko/20100101 Thunderb
* Origin: _thePharcyde distribution system (Wisconsin) (21:1/200)