[issue8372] socket: Buffer overrun while reading unterminated AF_UNIX addresses
David Watson
report at bugs.python.org
Sun Sep 5 21:47:57 CEST 2010
David Watson <baikie at users.sourceforge.net> added the comment:
> > baikie: why did the test pass for you?
>
> The test passes (I assume) if linux-pass-unterminated.diff is applied. The latter patch is only meant to exhibit the issue, though, not to be checked in.
No, I meant for linux-pass-unterminated.diff to be checked in so
that applications could always send datagrams back to the address
they got them from, even when it was 108 bytes long. As it is
run only on Linux, testMaxPathLen does not leave space for a null
terminator because Linux just ignores it (that is what makes it
possible to bind to a 108-byte address and thus trigger the bug).
----------
title: socket: Buffer overrun while reading unterminated AF_UNIX addresses -> socket: Buffer overrun while reading unterminated AF_UNIX addresses
_______________________________________
Python tracker <report at bugs.python.org>
<http://bugs.python.org/issue8372>
_______________________________________
More information about the Python-bugs-list
mailing list