Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 336611 - app-accessibility/sphinx3 _FORTIFY_SOURCE indicates presence of overflow
Summary: app-accessibility/sphinx3 _FORTIFY_SOURCE indicates presence of overflow
Status: RESOLVED TEST-REQUEST
Alias: None
Product: Gentoo Linux
Classification: Unclassified
Component: Current packages (show other bugs)
Hardware: All Linux
: High major (vote)
Assignee: Gentoo Accessibility Team
URL:
Whiteboard:
Keywords:
Depends on:
Blocks: fortify-source
  Show dependency tree
 
Reported: 2010-09-09 14:49 UTC by Diego Elio Pettenò (RETIRED)
Modified: 2012-09-22 11:21 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments
Build log (sphinx3-0.6.3:20100908-125324.log,489.87 KB, text/plain)
2010-09-09 14:50 UTC, Diego Elio Pettenò (RETIRED)
Details
Patch to sphinx3-0.6.3.ebuild to fix reported buffer overflows (sphinx3-0.6.3.ebuild.patch,940 bytes, patch)
2010-10-09 20:56 UTC, Kevin Pyle
Details | Diff

Note You need to log in before you can comment on or make changes to this bug.
Description Diego Elio Pettenò (RETIRED) gentoo-dev 2010-09-09 14:49:53 UTC
You're receiving this bug because the package in Summary has produced _FORTIFY_SOURCE related warnings indicating the presence of a sure overflow in a static buffer.

Even though this is not always an indication of a security problem it might even be. So please check this out ASAP.

By the way, _FORTIFY_SOURCE is disabled when you disable optimisation, so don't try finding out the cause using -O0.

Thanks,
Your friendly neighborhood tinderboxer
Comment 1 Diego Elio Pettenò (RETIRED) gentoo-dev 2010-09-09 14:50:21 UTC
Created attachment 246610 [details]
Build log
Comment 2 Kevin Pyle 2010-10-09 20:56:44 UTC
Created attachment 250053 [details, diff]
Patch to sphinx3-0.6.3.ebuild to fix reported buffer overflows

The first overflow is because the code uses strcpy to copy a sequence that is not meant to be null terminated.  The sed changes it to use memcpy for this instead.

The second overflow is because the code allocates a char[1] to hold a string that is one character plus a null.  The sed changes it to be a char[2].
Comment 3 Pacho Ramos gentoo-dev 2012-09-22 11:21:22 UTC
Still valid with 0.8?