Package: calcoo
Version: 1.3.16-1
Severity: normal
Tags: patch
The calcoo package contains the following code in src/b_loadsave.c:
strcpy(settings_filename, getenv("HOME"));
strcat(settings_filename, "/.calcoo");
Here the contents of $HOME are copied into a fixed size buffer without
checking for size first. Were this program setuid/setgid it would be
an exploitable security hole. As it is this is just a minor bug which
should be patched.
The following code is better:
snprintf(settings_filename, sizeof(settings_filename)-1,
"%s/.calcoo", getenv( "HOME" ) );
Steve
--
-- System Information:
Debian Release: lenny/sid
APT prefers unstable
APT policy: (500, 'unstable')
Architecture: amd64 (x86_64)
Kernel: Linux 2.6.18-xen (SMP w/2 CPU cores)
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/bash
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]