Bug 126485 - in debug version - very large ini file may cause buffer overflow
Summary: in debug version - very large ini file may cause buffer overflow
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Red Hat Enterprise Linux 3
Classification: Red Hat
Component: ia32el
Version: 3.0
Hardware: ia64
OS: Linux
medium
high
Target Milestone: ---
Assignee: Jakub Jelinek
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2004-06-22 11:17 UTC by Yoav Zach
Modified: 2008-05-01 15:38 UTC (History)
0 users

Fixed In Version: 1.0-4
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2004-10-02 17:52:02 UTC
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)
fixes the possible bof problem when reading the config file (453 bytes, text/plain)
2004-06-22 11:18 UTC, Yoav Zach
no flags Details

Description Yoav Zach 2004-06-22 11:17:53 UTC
Description of problem:
The function that reads the ini file in debug mode puts a null char 
at the end of the text read from the file. this null char may be out 
of bounds of the input buffer.

Version-Release number of selected component (if applicable):


How reproducible:


Steps to Reproduce:
1.
2.
3.
  
Actual results:


Expected results:


Additional info:

Comment 1 Yoav Zach 2004-06-22 11:18:39 UTC
Created attachment 101329 [details]
fixes the possible bof problem when reading the config file


Note You need to log in before you can comment on or make changes to this bug.