Bug#624775: lv2core: Buffer overflow in serd-0.1.0.c
Dan Muresan
danmbox3 at yahoo.ro
Sun May 1 14:52:59 UTC 2011
Package: lv2core
Version: 4.0-5
Severity: normal
Tags: patch
This is a bug against the SOURCE package from Debian Sid so my distribution
is irrelevant.
When building lv2core-4.0-5 from sid, I noticed a warning about snprintf
being guaranteed to overflow in write_text. The problem seems to be that the
local variable `escape' is declared as char [10], then used in snprintf as
if it had 11 characters.
Attached patch trivially fixes that.
-- System Information:
Debian Release: squeeze/sid
APT prefers lucid-updates
APT policy: (500, 'lucid-updates'), (500, 'lucid-security'), (500, 'lucid-proposed'), (500, 'lucid-backports'), (500, 'lucid')
Architecture: i386 (i686)
Kernel: Linux 2.6.31-11-rt (SMP w/2 CPU cores; PREEMPT)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
-------------- next part --------------
A non-text attachment was scrubbed...
Name: 0002_serd_write_text_escape_buf_overflow.patch
Type: text/x-c
Size: 384 bytes
Desc: not available
URL: <http://lists.alioth.debian.org/pipermail/pkg-multimedia-maintainers/attachments/20110501/bebdbf80/attachment.bin>
More information about the pkg-multimedia-maintainers
mailing list