From: Eric Bollengier Date: Tue, 8 Jul 2014 11:20:43 +0000 (+0200) Subject: Ensure b_sterror() is using the correct size of input buffer X-Git-Tag: Release-7.0.5~21 X-Git-Url: https://git.sur5r.net/?a=commitdiff_plain;h=7948506ff454a44e2179ec6d70a47898d6c6922e;p=bacula%2Fbacula Ensure b_sterror() is using the correct size of input buffer --- diff --git a/bacula/src/lib/berrno.c b/bacula/src/lib/berrno.c index a8973de038..8f3968b68e 100644 --- a/bacula/src/lib/berrno.c +++ b/bacula/src/lib/berrno.c @@ -71,7 +71,7 @@ const char *berrno::bstrerror() } #endif /* Normal errno */ - if (b_strerror(m_berrno, m_buf, 1024) < 0) { + if (b_strerror(m_berrno, m_buf, sizeof_pool_memory(m_buf)) < 0) { return _("Invalid errno. No error message possible."); } return m_buf;