Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 30 Jun 2018 18:15:18 +0000
From:      bugzilla-noreply@freebsd.org
To:        bugs@FreeBSD.org
Subject:   [Bug 229433] overflow at realpath()
Message-ID:  <bug-229433-227@https.bugs.freebsd.org/bugzilla/>

next in thread | raw e-mail | index | archive | help

https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=229433

            Bug ID: 229433
           Summary: overflow at realpath()
           Product: Base System
           Version: CURRENT
          Hardware: Any
                OS: Any
            Status: New
          Severity: Affects Many People
          Priority: ---
         Component: bin
          Assignee: bugs@FreeBSD.org
          Reporter: mishra.dhiraj95@gmail.com

File:
https://github.com/freebsd/freebsd/blob/master/contrib/mdocml/mandocdb.c#L613

i.e

if (realpath(path, buf) == NULL) {

This function does not protect against buffer overflows, and some
implementations can overflow internally.

Ensure that the destination buffer is at least of size MAXPATHLEN, andto
protect against implementation problems, the input argument should also be
checked to
ensure it is no larger than MAXPATHLEN.

realpath() output buffers should be large enough to handle the maximum-size
possible result from path manipulation functions, at least of size PATH_MAX

-- 
You are receiving this mail because:
You are the assignee for the bug.


Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-229433-227>