Fix stack buffer overflow found by address sanitizer
This bug was only in some extra test code and only read access. However, it should be fixed anyway.
This commit is contained in:
parent
ea78943e86
commit
7fb3ca2c3a
@ -328,7 +328,9 @@ Function {writePrefs()} {open return_type void
|
||||
fl_message( "Assertion failed:\\nNot all group entries were found!" );
|
||||
|
||||
/* sample code only: */
|
||||
unsigned int hex = 0x2387efcd;
|
||||
eat.set( "binFoo", (void*)&hex, sizeof( unsigned int ) );
|
||||
eat.set( "binFoo2", (void*)&bed, 256 );} {}
|
||||
unsigned int foo = 0x2387efcd;
|
||||
unsigned int foo2[4] = { 0xefbeadde, 0xefcdab89, 0x00010203, 0xfdfeff00 };
|
||||
eat.set( "binFoo", (void*)&foo, sizeof( unsigned int ) );
|
||||
eat.set( "binFoo2", (void*)&foo2, sizeof( foo2 ) );} {selected
|
||||
}
|
||||
}
|
||||
|
||||
Loading…
Reference in New Issue
Block a user