Bug 180 - potential buffer overflow in use of strncat
potential buffer overflow in use of strncat
Status: RESOLVED FIXED
Product: unbound
Classification: Unclassified
Component: server
unspecified
Other Linux
: P2 normal
Assigned To: unbound team
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2008-05-27 10:57 CEST by Klaus Singvogel
Modified: 2008-05-28 16:31 CEST (History)
2 users (show)

See Also:


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Klaus Singvogel 2008-05-27 10:57:50 CEST
There is a potential buffer overflow in use of strncat().
The used size isn't subtracted from the number of bytes to copy.

See patch proposal, which will be attached to this bugzilla entry.
Comment 1 Jelte Jansen 2008-05-28 15:30:16 CEST

*** This bug has been marked as a duplicate of bug 181 ***
Comment 2 Klaus Singvogel 2008-05-28 15:59:32 CEST
Sorry, but I doubt that it is a duplicate.
This affects the unbound source code itself, whereas bug 181 affects the included library.
Comment 3 Jelte Jansen 2008-05-28 16:31:07 CEST
ah, my bad, thought that one was referring to the ldns lib too.
strlens added in trunk, rev. 1101