Summary: | games-roguelike/scourge _FORTIFY_SOURCE indicates presence of overflow | ||
---|---|---|---|
Product: | Gentoo Linux | Reporter: | Diego Elio Pettenò (RETIRED) <flameeyes> |
Component: | [OLD] Games | Assignee: | Gentoo Games <games> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | hardened |
Priority: | High | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Package list: | Runtime testing required: | --- | |
Bug Depends on: | |||
Bug Blocks: | 259417 | ||
Attachments: |
Build log
Patch to scourge-0.21.1.ebuild to add a sed to fix the overflow |
Description
Diego Elio Pettenò (RETIRED)
![]() Created attachment 246599 [details]
Build log
Created attachment 246798 [details, diff]
Patch to scourge-0.21.1.ebuild to add a sed to fix the overflow
The upstream code declares char tmp[255], then tells snprintf that the buffer is 256 characters long. The sed fixes it to use sizeof(tmp) in the call to snprintf.
Fixed in portage. Thanks for the patch. |