Hello Alexander,

I don't quite understand what you are indending with this patch:

https://github.com/mbait/fricas/commit/35ff9a71b838440fcf16eee5aee14d5726086a09#diff-1

It is inherently unsafe when the -eval's become longer than 1024 bytes.

http://en.wikipedia.org/wiki/Strcpy#Buffer_overflows

Same problem for augmented_ws_path. There it's even only 256 bytes long.

Also

https://github.com/mbait/fricas/commit/81359c8186a4de6a3ee2d0d745328372c9f97de9#diff-1

can cause a buffer overflow.

Ralf

--
You received this message because you are subscribed to the Google Groups "FriCAS - 
computer algebra system" group.
To post to this group, send email to [email protected].
To unsubscribe from this group, send email to 
[email protected].
For more options, visit this group at 
http://groups.google.com/group/fricas-devel?hl=en.

Reply via email to