[sword-devel] [PATCH] filters: Fixed a number of buffer overflows due to buffers being too short for sprintf.
Troy A. Griffitts
scribe at crosswire.org
Wed Nov 1 06:31:27 MST 2017
Applied. Thanks Jaak! Great find.
On 09/27/2017 10:39 PM, Jaak Ristioja wrote:
> Hello!
>
> A recent version of GCC discovered a number of exploitable buffer
> overflows in Sword++. Find as attachment a patch ported for Sword master.
>
> J
>
>
> _______________________________________________
> sword-devel mailing list: sword-devel at crosswire.org
> http://www.crosswire.org/mailman/listinfo/sword-devel
> Instructions to unsubscribe/change your settings at above page
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://www.crosswire.org/pipermail/sword-devel/attachments/20171101/3e70a3e7/attachment-0001.html>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: OpenPGP digital signature
URL: <http://www.crosswire.org/pipermail/sword-devel/attachments/20171101/3e70a3e7/attachment-0001.sig>
More information about the sword-devel
mailing list