Package: ttyrec
Version: 1.0.8-5.1
Severity: normal
Tags: upstream

Dear Maintainer,

The format is read thus:
  int read_header(FILE *fp, Header *h)
  {
      uint32_t buf[3];
  
      if (fread_wrapper(buf, sizeof(uint32_t), 3, fp) == 0)
      {
          return 0;
      }
  
      h->tv.tv_sec  = convert_to_little_endian(buf[0]);
      h->tv.tv_usec = convert_to_little_endian(buf[1]);
      h->len        = convert_to_little_endian(buf[2]);
  
      return 1;
  }

Naturally, this makes it susceptible to y2038.

Given that this format is produced and consumed by multiple
implementations, some sort of Reasonably Coordinated Implementation
needs to be invented here.

Best,

-- System Information:
Debian Release: 12.9
  APT prefers stable-updates
  APT policy: (500, 'stable-updates'), (500, 'stable-security'), (500, 
'stable-debug'), (500, 'stable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 6.1.0-27-amd64 (SMP w/24 CPU threads; PREEMPT)
Kernel taint flags: TAINT_PROPRIETARY_MODULE, TAINT_FIRMWARE_WORKAROUND, 
TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_GB:en
Shell: /bin/sh linked to /usr/bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages ttyrec depends on:
ii  libc6  2.36-9+deb12u9

ttyrec recommends no packages.

ttyrec suggests no packages.

Attachment: signature.asc
Description: PGP signature

Reply via email to