Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 343133 - app-misc/g15daemon _FORTIFY_SOURCE indicates presence of overflow
Summary: app-misc/g15daemon _FORTIFY_SOURCE indicates presence of overflow
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Linux
Classification: Unclassified
Component: Current packages (show other bugs)
Hardware: All Linux
: High major (vote)
Assignee: Robin Johnson
URL:
Whiteboard:
Keywords:
: 354921 (view as bug list)
Depends on:
Blocks: fortify-source
  Show dependency tree
 
Reported: 2010-10-28 18:35 UTC by Diego Elio Pettenò (RETIRED)
Modified: 2011-08-03 07:50 UTC (History)
3 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments
Build log (g15daemon-1.9.5.3-r3:20101028-164720.log,35.19 KB, text/plain)
2010-10-28 18:36 UTC, Diego Elio Pettenò (RETIRED)
Details
Patch to g15daemon-1.9.5.3-r3.ebuild to resolve reported overflow (g15daemon-1.9.5.3-r3.ebuild.patch,423 bytes, patch)
2010-12-18 20:54 UTC, Kevin Pyle
Details | Diff

Note You need to log in before you can comment on or make changes to this bug.
Description Diego Elio Pettenò (RETIRED) gentoo-dev 2010-10-28 18:35:23 UTC
You're receiving this bug because the package in Summary has produced _FORTIFY_SOURCE related warnings indicating the presence of a sure overflow in a static buffer.

Even though this is not always an indication of a security problem it might even be. So please check this out ASAP.

By the way, _FORTIFY_SOURCE is disabled when you disable optimisation, so don't try finding out the cause using -O0.

Thanks,
Your friendly neighborhood tinderboxer
Comment 1 Diego Elio Pettenò (RETIRED) gentoo-dev 2010-10-28 18:36:02 UTC
Created attachment 252409 [details]
Build log
Comment 2 Kevin Pyle 2010-12-18 20:54:08 UTC
Created attachment 257515 [details, diff]
Patch to g15daemon-1.9.5.3-r3.ebuild to resolve reported overflow

Upstream uses a hardcoded size of 10 for recv, but passes a buffer that is only int[2], which is too small.  It happens to work for the intended use since they really only expect to receive 1 byte, but this patch fixes it so that the argument to recv specifies the proper length.
Comment 3 Robin Johnson archtester Gentoo Infrastructure gentoo-dev Security 2011-08-03 07:49:52 UTC
*** Bug 354921 has been marked as a duplicate of this bug. ***
Comment 4 Robin Johnson archtester Gentoo Infrastructure gentoo-dev Security 2011-08-03 07:50:10 UTC
Fixed in r4 (used the patch from the other bug).