Package: calcoo
Version: 1.3.16-1
Severity: normal
Tags: patch

  The calcoo package contains the following code in src/b_loadsave.c:


    strcpy(settings_filename, getenv("HOME"));
    strcat(settings_filename, "/.calcoo");

  Here the contents of $HOME are copied into a fixed size buffer without 
 checking for size first.  Were this program setuid/setgid it would be
 an exploitable security hole.  As it is this is just a minor bug which
 should be patched.

  The following code is better:

   snprintf(settings_filename, sizeof(settings_filename)-1,
            "%s/.calcoo", getenv( "HOME" ) );


Steve
-- 

-- System Information:
Debian Release: lenny/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: amd64 (x86_64)

Kernel: Linux 2.6.18-xen (SMP w/2 CPU cores)
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to