This is the mail archive of the
cygwin-patches@cygwin.com
mailing list for the Cygwin project.
Re: cygwin build SEGV
- To: cygwin-patches at cygwin dot com
- Subject: Re: cygwin build SEGV
- From: egor duda <deo at logos-m dot ru>
- Date: Thu, 6 Sep 2001 00:23:44 +0400
- Organization: deo
- References: <3B950586.3050106@ece.gatech.edu> <20010904130237.B7509@redhat.com><3B950F1E.80008@ece.gatech.edu> <114122083636.20010904223654@logos-m.ru><3B958C2F.6040003@ece.gatech.edu> <20010904225434.A12398@redhat.com><3B9598F0.8050008@ece.gatech.edu> <20010904234003.A13012@redhat.com><20010905000529.A13237@redhat.com> <3B95AA46.5090000@ece.gatech.edu><20010905011923.A17984@redhat.com>
- Reply-To: egor duda <cygwin-patches at cygwin dot com>
Hi!
Wednesday, 05 September, 2001 Christopher Faylor cgf@redhat.com wrote:
ok, i've reproduced something similar and i believe i know the reason.
in my case set_nt_attribute is called with alloca()ed buffer of size
256, but actual security descriptor is 268 bytes long. Bang. Stack
corrupted. This is a workaround, though i think alloc_sd should check
buffer size, but i cannot produce a patch for this right now.
hopefully, 4k is enough for any sd. And yes, i think it's a
show-stopper.
Egor. mailto:deo@logos-m.ru ICQ 5165414 FidoNet 2:5020/496.19
alloca-fix.diff
alloca-fix.ChangeLog