Summary: | app-accessibility/sphinx3 _FORTIFY_SOURCE indicates presence of overflow | ||
---|---|---|---|
Product: | Gentoo Linux | Reporter: | Diego Elio Pettenò (RETIRED) <flameeyes> |
Component: | Current packages | Assignee: | Gentoo Accessibility Team <accessibility> |
Status: | RESOLVED TEST-REQUEST | ||
Severity: | major | CC: | hardened |
Priority: | High | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Package list: | Runtime testing required: | --- | |
Bug Depends on: | |||
Bug Blocks: | 259417 | ||
Attachments: |
Build log
Patch to sphinx3-0.6.3.ebuild to fix reported buffer overflows |
Description
Diego Elio Pettenò (RETIRED)
![]() Created attachment 246610 [details]
Build log
Created attachment 250053 [details, diff]
Patch to sphinx3-0.6.3.ebuild to fix reported buffer overflows
The first overflow is because the code uses strcpy to copy a sequence that is not meant to be null terminated. The sed changes it to use memcpy for this instead.
The second overflow is because the code allocates a char[1] to hold a string that is one character plus a null. The sed changes it to be a char[2].
Still valid with 0.8? |