Bug#624775: lv2core: Buffer overflow in serd-0.1.0.c

Dan Muresan danmbox3 at yahoo.ro
Sun May 1 14:52:59 UTC 2011


Package: lv2core
Version: 4.0-5
Severity: normal
Tags: patch


This is a bug against the SOURCE package from Debian Sid so my distribution 
is irrelevant.

When building lv2core-4.0-5 from sid, I noticed a warning about snprintf 
being guaranteed to overflow in write_text. The problem seems to be that the 
local variable `escape' is declared as char [10], then used in snprintf as 
if it had 11 characters.

Attached patch trivially fixes that.

-- System Information:
Debian Release: squeeze/sid
  APT prefers lucid-updates
  APT policy: (500, 'lucid-updates'), (500, 'lucid-security'), (500, 'lucid-proposed'), (500, 'lucid-backports'), (500, 'lucid')
Architecture: i386 (i686)

Kernel: Linux 2.6.31-11-rt (SMP w/2 CPU cores; PREEMPT)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
-------------- next part --------------
A non-text attachment was scrubbed...
Name: 0002_serd_write_text_escape_buf_overflow.patch
Type: text/x-c
Size: 384 bytes
Desc: not available
URL: <http://lists.alioth.debian.org/pipermail/pkg-multimedia-maintainers/attachments/20110501/bebdbf80/attachment.bin>


More information about the pkg-multimedia-maintainers mailing list