From: Bernhard Herzog <bh@intevation.de>
To: emacs-devel@gnu.org
Subject: Patch fixing buffer overflow in trunk
Date: Tue, 04 May 2010 17:14:41 +0200 [thread overview]
Message-ID: <s9zbpcvvgv2.fsf@thoe.hq.intevation.de> (raw)
[-- Attachment #1: Type: text/plain, Size: 1960 bytes --]
Hi,
since yesterday I've been running into crashes when starting emacs from
bzr trunk that seemed to depend on the current working directory.
E.g. starting from one particular directory would lead to a practically
immediate crash with the output:
*** glibc detected *** emacs: malloc(): memory corruption: 0x086c6c90 ***
======= Backtrace: =========
/lib/libc.so.6[0xb7505845]
Changing into another directory, e.g. the parent directory of the one
where it just failed, would solve the problem and emacs would start.
Investigating further, it seemed to depend on the length of the absolute
name of the current directory. And a little bisecting in the bzr
history showed that the defect was introduced in revision 100117 in the
following lines:
--- src/xsmfns.c 2010-02-10 09:29:28 +0000
+++ src/xsmfns.c 2010-05-02 18:44:04 +0000
@@ -246,7 +251,19 @@
props[props_idx]->vals[2].length = strlen (NOSPLASH_OPT);
props[props_idx]->vals[2].value = NOSPLASH_OPT;
- val_idx += 3;
+
+ cwd = get_current_dir_name ();
+ if (cwd)
+ {
+ chdir_opt = xmalloc (strlen (CHDIR_OPT) + strlen (client_id) + 1);
+ strcpy (chdir_opt, CHDIR_OPT);
+ strcat (chdir_opt, cwd);
+
+ props[props_idx]->vals[3].length = strlen (chdir_opt);
+ props[props_idx]->vals[3].value = chdir_opt;
+ }
+
+ val_idx += cwd ? 4 : 3;
++props_idx;
/* User id. */
Clearly, that strlen (client_id) should actually be strlen (cwd). The
patch below fixes this.
Bernhard
=== modified file 'src/xsmfns.c'
--- src/xsmfns.c 2010-05-02 18:44:04 +0000
+++ src/xsmfns.c 2010-05-04 14:33:08 +0000
@@ -255,7 +255,7 @@
cwd = get_current_dir_name ();
if (cwd)
{
- chdir_opt = xmalloc (strlen (CHDIR_OPT) + strlen (client_id) + 1);
+ chdir_opt = xmalloc (strlen (CHDIR_OPT) + strlen (cwd) + 1);
strcpy (chdir_opt, CHDIR_OPT);
strcat (chdir_opt, cwd);
[-- Attachment #2: Type: application/pgp-signature, Size: 188 bytes --]
next reply other threads:[~2010-05-04 15:14 UTC|newest]
Thread overview: 2+ messages / expand[flat|nested] mbox.gz Atom feed top
2010-05-04 15:14 Bernhard Herzog [this message]
2010-05-04 16:03 ` Patch fixing buffer overflow in trunk Jan Djärv
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
List information: https://www.gnu.org/software/emacs/
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=s9zbpcvvgv2.fsf@thoe.hq.intevation.de \
--to=bh@intevation.de \
--cc=emacs-devel@gnu.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
Code repositories for project(s) associated with this public inbox
https://git.savannah.gnu.org/cgit/emacs.git
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).