This is the mail archive of the
glibc-bugs@sourceware.org
mailing list for the glibc project.
[Bug stdio/19165] fread overflow
- From: "cherepan at mccme dot ru" <sourceware-bugzilla at sourceware dot org>
- To: glibc-bugs at sourceware dot org
- Date: Fri, 23 Oct 2015 08:43:09 +0000
- Subject: [Bug stdio/19165] fread overflow
- Auto-submitted: auto-generated
- References: <bug-19165-131 at http dot sourceware dot org/bugzilla/>
https://sourceware.org/bugzilla/show_bug.cgi?id=19165
--- Comment #3 from Alexander Cherepanov <cherepan at mccme dot ru> ---
(In reply to Rich Felker from comment #2)
> If your interpretation is that the dest pointer passed in must point to ab
> object of size size*nmemb, this is a non-issue.
It could be debated but it's not my point.
> However perhaps it's valid
> to pass a size larger than any possible object if you know the read will hit
> eof before overflowing the buffer.
Exactly! Processing an untrusted file in a trusted location and using its size
as a buffer size for all reads from it.
--
You are receiving this mail because:
You are on the CC list for the bug.