Pierre Pronchery c412166aaa Fix two erroneous calls to strlcat()
strlcat() needs to be informed about the actual size of the buffer. Two
calls simply used the size expected, thus potentially allowing
stack-based buffer overflows.

There is no direct security impact in this case, since the code affected
is on the client side, and the input comes from configuration
information.
2018-08-07 09:48:30 +02:00
..
2018-07-17 16:45:46 +02:00
2018-08-07 09:48:30 +02:00
2016-01-01 02:13:21 +00:00
2016-01-02 20:18:12 -06:00
2016-01-01 02:13:21 +00:00
2016-01-01 02:13:21 +00:00
2016-01-01 02:13:21 +00:00