-
Notifications
You must be signed in to change notification settings - Fork 674
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
memory corruption in socket::recvfrom() #1762
Labels
Comments
Oh, good catch! I'll fix it shortly. |
asomers
added a commit
to asomers/nix
that referenced
this issue
Jul 14, 2022
IPv4 and stream sockets are unaffected, but for datagram sockets of other address types libc::recvfrom might overwrite part of the stack. Fixes nix-rust#1762
bors bot
added a commit
that referenced
this issue
Jul 14, 2022
1763: Fix a buffer overflow in sys::socket::recvfrom r=posborne a=asomers IPv4 and stream sockets are unaffected, but for datagram sockets of other address types libc::recvfrom might overwrite part of the stack. Fixes #1762 Co-authored-by: Alan Somers <[email protected]>
rtzoeller
pushed a commit
to rtzoeller/nix
that referenced
this issue
Jul 17, 2022
IPv4 and stream sockets are unaffected, but for datagram sockets of other address types libc::recvfrom might overwrite part of the stack. Fixes nix-rust#1762
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
The
addr
field innix/src/sys/socket/mod.rs
Lines 1915 to 1924 in e5f354c
libc::sockaddr
. This will overflow for most sockaddr types.I suggest to write this as
The text was updated successfully, but these errors were encountered: