Hi,
Could you check with the enclosed patch that it works fine.
Thanks,
--
Franck Joncourt
http://debian.org - http://smhteam.info/wiki/
Author: Franck Joncourt franck.m...@dthconnex.com
Bugs: 528675
Description: fix buffer overflows due to an unsafe use of strcpy.
+ Define a constant,
Hi Franck:
Thanks for the patch. It looks good. However, I'm wondering why you
chose to use strncpy instead of strlcpy? If it's a portability issue,
then perhaps it would be possible to detect if strlcpy is available on
the system and fall back on strncpy otherwise?
It's probably not a big deal,
Package: libnet-arp-perl
Version: 1.0.3-2
Severity: normal
Tags: patch
Hello,
libnet-arp-perl fails to build in Ubuntu karmic because of a buffer
overflow in get_mac_linux():
t/get_mac*** buffer overflow detected ***: /usr/bin/perl terminated
=== Backtrace: =
Michael Bienia wrote:
Hello,
Hi,
libnet-arp-perl fails to build in Ubuntu karmic because of a buffer
overflow in get_mac_linux():
t/get_mac*** buffer overflow detected ***: /usr/bin/perl terminated
=== Backtrace: =
/lib/libc.so.6(__fortify_fail+0x4b)[0x4014c97b]
4 matches
Mail list logo