Bugzilla – Bug 180
potential buffer overflow in use of strncat
Last modified: 2008-05-28 16:31:07 CEST
There is a potential buffer overflow in use of strncat().
The used size isn't subtracted from the number of bytes to copy.
See patch proposal, which will be attached to this bugzilla entry.
*** This bug has been marked as a duplicate of bug 181 ***
Sorry, but I doubt that it is a duplicate.
This affects the unbound source code itself, whereas bug 181 affects the included library.
ah, my bad, thought that one was referring to the ldns lib too.
strlens added in trunk, rev. 1101