[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [Chicken-hackers] Fix buffer overflow found by #1308
From: |
Peter Bex |
Subject: |
Re: [Chicken-hackers] Fix buffer overflow found by #1308 |
Date: |
Sat, 30 Jul 2016 21:23:00 +0200 |
User-agent: |
Mutt/1.5.23 (2014-03-12) |
On Thu, Jul 28, 2016 at 09:19:14PM +0200, Peter Bex wrote:
> We've discussed this some more on IRC, and I think that we all agree
> that it's better to refactor this whole mess. The attached patch is
> a complete overhaul of process-execute and process-spawn (which was
> equally affected by the ARG_MAX/ENV_MAX sized buffer overrun).
The previous mailed contained only a patch for master. Here's the
chicken-5 patch.
Cheers,
Peter
0001-Fix-buffer-overflow-in-posix-execvp-execve-wrapper.patch
Description: Text Data
signature.asc
Description: Digital signature