This is the mail archive of the glibc-bugs@sourceware.org mailing list for the glibc project.


Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]
Other format: [Raw text]

[Bug stdio/19165] fread overflow


https://sourceware.org/bugzilla/show_bug.cgi?id=19165

--- Comment #3 from Alexander Cherepanov <cherepan at mccme dot ru> ---
(In reply to Rich Felker from comment #2)
> If your interpretation is that the dest pointer passed in must point to ab
> object of size size*nmemb, this is a non-issue.

It could be debated but it's not my point.

> However perhaps it's valid
> to pass a size larger than any possible object if you know the read will hit
> eof before overflowing the buffer.

Exactly! Processing an untrusted file in a trusted location and using its size
as a buffer size for all reads from it.

-- 
You are receiving this mail because:
You are on the CC list for the bug.


Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]