On Thu, Nov 04, 2004 at 03:56:07PM +0000, Gustavo J. A. M. Carneiro wrote: > Qui, 2004-11-04 às 10:38 -0500, Mihai Ibanescu escreveu: > > Hello, > > > > Can someone confirm this is indeed an overflow by one in socketmodule.c? > > > > > > static PyObject * > > socket_inet_ntop(PyObject *self, PyObject *args) > > { > > int af; > > char* packed; > > int len; > > const char* retval; > > #ifdef ENABLE_IPV6 > > char ip[MAX(INET_ADDRSTRLEN, INET6_ADDRSTRLEN) + 1]; > > #else > > char ip[INET_ADDRSTRLEN + 1]; > > #endif > > > > /* Guarantee NUL-termination for PyString_FromString() below */ > > memset((void *) &ip[0], '\0', sizeof(ip) + 1); > > > > > > If it is I'll go ahead and file it. > > Indeed, looks like buffer overflow to me.. Filed as SF bug 105470 Misa
RetroSearch is an open source project built by @garambo | Open a GitHub Issue
Search and Browse the WWW like it's 1997 | Search results from DuckDuckGo
HTML:
3.2
| Encoding:
UTF-8
| Version:
0.7.4