Bug#785109: buffer overruns...

Johann Klammer klammerj at a1.net
Tue May 12 12:44:08 UTC 2015


Package: asylum
Version: 0.3.2-1
Tags: patch

I tried to debug the segfault I get sometime at the end of the second level. 
This is what I found. two buffer overruns... a stale FILE*...
Perhaps there's more... 
Did not get to finish the second level yet...

The keyword[12] and FILE* was found using cppcheck. 
The *spaceptr= was flagged by dmalloc:
[...]
1431426941: 40000: process pid = 4165
1431426941: 40000:   error details: checking user pointer
1431426941: 40000:   pointer '0xb5b9e008' from 'unknown' prev access 'file.c:145'
1431426941: 40000:   dump of proper fence-top bytes: 'i\336\312\372'
1431426941: 40000:   dump of '0xb5b9e008'+28480: '\022\013\'\000\022\f\'\000\022\r\'\000\022\016\'\000\377\336\312\372'
1431426941: 40000:   next pointer '0xb5ba5000' (size 19657) may have run under from 'file.c:145'
1431426941: 40000: ERROR: _dmalloc_chunk_heap_check: failed OVER picket-fence magic-number check (err 27)
[...]


please apply the patch


-------------- next part --------------
A non-text attachment was scrubbed...
Name: overruns.patch
Type: text/x-diff
Size: 1261 bytes
Desc: not available
URL: <http://lists.alioth.debian.org/pipermail/pkg-games-devel/attachments/20150512/fa9e7098/attachment.patch>


More information about the Pkg-games-devel mailing list