From 05f682115c77b777a98e8ed2d35335e8e2cbf7b0 Mon Sep 17 00:00:00 2001 From: Mark Pizzolato Date: Mon, 27 Aug 2018 12:09:25 -0700 Subject: [PATCH] H316: Avoid potential buffer overflow for UDP connect string --- H316/h316_udp.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/H316/h316_udp.c b/H316/h316_udp.c index 2ea2a8e1..f981beda 100644 --- a/H316/h316_udp.c +++ b/H316/h316_udp.c @@ -270,7 +270,7 @@ t_stat udp_create (DEVICE *dptr, const char *premote, int32 *pln) // which is a handle used to identify this connection to all future udp_xyz() // calls. t_stat ret; - char linkinfo[128]; + char linkinfo[256]; int32 link = udp_find_free_link(); if (link < 0) return SCPE_MEM;