On Mon, Feb 28, 2000 at 11:29:41PM +0000, Tom Gilbert wrote:
| > Show us the code. Better still, first winnow it down to as small an example
| > as you can and still have it fail. And then show us the code.
|
| Seen it now. The offending line was:
| #define PATH_VARIABLE_NAME "TTSDATA"
| [...]
| strcpy(task_filename, getenv(PATH_VARIABLE_NAME));
| On his Sun system, the environment variable TTSDATA is defined, on his
| linux box, it is not :)
| That's where it segfaults. getenv returns NULL and the first strlen()
| in strcpy() dumps core.
| So it's not a Sun/Linux thing, it's an environment thing :)
Bleah. No, it's a _classic_ example of unchecked calls. getenv() can always
return NULL - there's NO excuse for not checking.
--
Cameron Simpson, DoD#743 [EMAIL PROTECTED] http://www.zip.com.au/~cs/
A workable solution might be to only trust hosts on the same physical
network, and modify gateways to reject packets that claim to, but do
not in fact, come from directly connected networks.
- from a 1985 paper by Robert Morris Snr entitled "A Weakness in the
4.2BSD Unix TCP/IP Software" in which he details TCP source spoofing,
10 years before IP spoofing became popular and 10 years before this
simple measure was widely implemented
--
To unsubscribe: mail [EMAIL PROTECTED] with "unsubscribe"
as the Subject.