Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Integer overflow in setenv #213

Open
mikevoronov opened this issue Aug 4, 2020 · 0 comments
Open

Integer overflow in setenv #213

mikevoronov opened this issue Aug 4, 2020 · 0 comments

Comments

@mikevoronov
Copy link
Contributor

mikevoronov commented Aug 4, 2020

This code could lead to integer overflow into malloc. In its turn with subsequent memcpy it could lead to heap overflow. Hypothetically it could affect users. If it is matter, I can make a PR.

P.S. Also it is interested are such cases matter in general? Are there any policy to or not to mitigate them? I can imagine situations when users could be affected of this behaviour, but don't know any real examples.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant