aboutsummaryrefslogtreecommitdiffstats
path: root/www/gallery
diff options
context:
space:
mode:
authorlioux <lioux@FreeBSD.org>2002-03-31 16:20:28 +0800
committerlioux <lioux@FreeBSD.org>2002-03-31 16:20:28 +0800
commitcc87aa96c8c1601336d9a1931df93b7dbfe9c09c (patch)
tree66fed3d4933c84ee46e8c94b49ed214a2b00679a /www/gallery
parent476e0314803ffe3ff2edb977aa22bb676f3d38cf (diff)
downloadfreebsd-ports-gnome-cc87aa96c8c1601336d9a1931df93b7dbfe9c09c.tar.gz
freebsd-ports-gnome-cc87aa96c8c1601336d9a1931df93b7dbfe9c09c.tar.zst
freebsd-ports-gnome-cc87aa96c8c1601336d9a1931df93b7dbfe9c09c.zip
Fix following security issue: "If a string of longer than approximately
2048 characters is sent to the qpopper process, a denial of service condition will occur" Actually, this is caused by an incorrect assumption. qpopper uses the same buffer over and over when communicating. However, it never makes sure that the buffer has been updated if something goes wrong. Therefore, one can try to add to this buffer over and over; thus, consuming available resources. Solution, do not follow unofficial patch available in bugtraq mailing list since losing pointer references is not an option. Otherwise, change the way both getline and tgetline functions work. Just so that they resemble read(2) return codes as follows: 1) if < 0 problem 2) if >= 0 user typed something (enter without anything else is something) First patch sent by Isao SEKI <iseki@gongon.com> PR: 36326 Prompted by: Alessandro de Manzano <ale@unixmania.net>, Isao SEKI <iseki@gongon.com> Reviewed by: eivind, Alessandro de Manzano <ale@unixmania.net>, David Rufino <dr@soniq.net>, Isao SEKI <iseki@gongon.com>
Diffstat (limited to 'www/gallery')
0 files changed, 0 insertions, 0 deletions