Summary: | Make it clearer that we do not overflow struct sockaddr_un.sun_path | ||
---|---|---|---|
Product: | dbus | Reporter: | Simon McVittie <smcv> |
Component: | core | Assignee: | Simon McVittie <smcv> |
Status: | RESOLVED FIXED | QA Contact: | D-Bus Maintainers <dbus> |
Severity: | normal | ||
Priority: | medium | Keywords: | patch |
Version: | git master | ||
Hardware: | Other | ||
OS: | Linux (All) | ||
Whiteboard: | review+ | ||
i915 platform: | i915 features: | ||
Attachments: | sysdeps: Reassure gcc 8 that we are not overflowing struct sockaddr_un |
Description
Simon McVittie
2018-07-23 17:58:34 UTC
D-Bus addresses have to come from a trusted source (if an attacker can induce you to connect to a crafted D-Bus address then you have bigger things to worry about, especially the unixexec: transport) so this wouldn't be a security problem even if it did overflow. Comment on attachment 140793 [details] [review] sysdeps: Reassure gcc 8 that we are not overflowing struct sockaddr_un Review of attachment 140793 [details] [review]: ----------------------------------------------------------------- LGTM. Comment on attachment 140793 [details] [review] sysdeps: Reassure gcc 8 that we are not overflowing struct sockaddr_un Review of attachment 140793 [details] [review]: ----------------------------------------------------------------- LGTM. Your reasoning about it not being a security problem seems sound. Fixed in git for 1.10.28, 1.12.10 and 1.13.6 |
Use of freedesktop.org services, including Bugzilla, is subject to our Code of Conduct. How we collect and use information is described in our Privacy Policy.