tThe buffer overflow reported by the fortify checks in sprintf is caused by the 
fact that the sprintf call on line 449 in xfstt.cc does not account for the 
terminating \0. The size of the target buffer fn.panose is exactly 20 bytes, 
and the code tries to write
20 chars + 1 terminating \0 into it.

I attached a patch fixing this problem.

Note that the source of xfstt in Debian sid (xfstt version 1.7-7) has
the same problem.


** Patch added: "patch correcting buffer overflow in sprintf call"
   http://launchpadlibrarian.net/47873908/sprintf_buferoverflow.patch

-- 
xfstt crashes in lucid lynx
https://bugs.launchpad.net/bugs/575026
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to