On Thu, 28 Jul 2011 08:06:51 -0700, Paul Eggert  wrote:
On 07/28/11 07:44, Daniel Macks wrote:
>   printf(foo);
> > is considered a potential security risk if foo is a variable rather than a simple quoted string. The solution is to do:
> >   printf("%s", foo);

I'm afraid this bug report is rather vague; without knowing the
details of which printf call we're talking about, there's not
much we can do.  Certainly there are some calls to printf-like
functions where the above transformation would break things,
as FOO is supposed to be a format.

The warning is only when foo really winds up as a simple string and not a format-string with %X that are replaced by subsequent parameters. Does this list like .patch attachments, or pasted directly into the email body, or...?

dan

 --
Daniel Macks
[email protected]



Reply via email to