Summary: | app-misc/g15daemon _FORTIFY_SOURCE indicates presence of overflow | ||
---|---|---|---|
Product: | Gentoo Linux | Reporter: | Diego Elio Pettenò (RETIRED) <flameeyes> |
Component: | Current packages | Assignee: | Robin Johnson <robbat2> |
Status: | RESOLVED FIXED | ||
Severity: | major | CC: | hardened, lcd, privat |
Priority: | High | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Package list: | Runtime testing required: | --- | |
Bug Depends on: | |||
Bug Blocks: | 259417 | ||
Attachments: |
Build log
Patch to g15daemon-1.9.5.3-r3.ebuild to resolve reported overflow |
Description
Diego Elio Pettenò (RETIRED)
![]() Created attachment 252409 [details]
Build log
Created attachment 257515 [details, diff]
Patch to g15daemon-1.9.5.3-r3.ebuild to resolve reported overflow
Upstream uses a hardcoded size of 10 for recv, but passes a buffer that is only int[2], which is too small. It happens to work for the intended use since they really only expect to receive 1 byte, but this patch fixes it so that the argument to recv specifies the proper length.
*** Bug 354921 has been marked as a duplicate of this bug. *** Fixed in r4 (used the patch from the other bug). |