Blame SOURCES/0020-clang-Avoid-buffer-overflow.patch

398fc5
From 6b14979cdb7a177e7c5567faa67449dd1365c1b9 Mon Sep 17 00:00:00 2001
398fc5
From: Rob Crittenden <rcritten@redhat.com>
398fc5
Date: Mon, 8 Oct 2018 13:16:08 -0400
398fc5
Subject: [PATCH 20/25] clang: Avoid buffer overflow
398fc5
398fc5
This shouldn't be possible because the caller would never allow
398fc5
it all to be passed in but quiet static analyzers.
398fc5
---
398fc5
 src/getcert.c | 4 ++--
398fc5
 1 file changed, 2 insertions(+), 2 deletions(-)
398fc5
398fc5
diff --git a/src/getcert.c b/src/getcert.c
398fc5
index 0d527ab0..bbc45479 100644
398fc5
--- a/src/getcert.c
398fc5
+++ b/src/getcert.c
398fc5
@@ -1839,8 +1839,8 @@ set_tracking(const char *argv0, const char *category,
398fc5
 	enum cm_tdbus_type bus = CM_DBUS_DEFAULT_BUS;
398fc5
 	DBusMessage *req, *rep;
398fc5
 	const char *request, *capath;
398fc5
-	struct cm_tdbusm_dict param[28];
398fc5
-	const struct cm_tdbusm_dict *params[29];
398fc5
+	struct cm_tdbusm_dict param[30];
398fc5
+	const struct cm_tdbusm_dict *params[30];
398fc5
 	char *nss_scheme, *dbdir = NULL, *token = NULL, *nickname = NULL;
398fc5
 	char **anchor_dbs = NULL, **anchor_files = NULL;
398fc5
 	char *id = NULL, *new_id = NULL, *new_request;
398fc5
-- 
398fc5
2.21.0
398fc5