git.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* sprintf security holes?
@ 2005-09-16 14:56 Randal L. Schwartz
  2005-09-16 16:11 ` Morten Welinder
                   ` (2 more replies)
  0 siblings, 3 replies; 5+ messages in thread
From: Randal L. Schwartz @ 2005-09-16 14:56 UTC (permalink / raw)
  To: git


As I was trying to (unsuccessfully) compile git for OpenBSD, I noticed
a number of occurances of sprintf(), because OpenBSD thoughtfully
yells at programmers for using that.

Since sprintf() can lead to buffer overflows from unprotected user
data, and you want to use git in server situtations, wouldn't it be
prudent to eliminate those in some near-ish timeframe?

-- 
Randal L. Schwartz - Stonehenge Consulting Services, Inc. - +1 503 777 0095
<merlyn@stonehenge.com> <URL:http://www.stonehenge.com/merlyn/>
Perl/Unix/security consulting, Technical writing, Comedy, etc. etc.
See PerlTraining.Stonehenge.com for onsite and open-enrollment Perl training!

^ permalink raw reply	[flat|nested] 5+ messages in thread

end of thread, other threads:[~2005-09-19 12:42 UTC | newest]

Thread overview: 5+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2005-09-16 14:56 sprintf security holes? Randal L. Schwartz
2005-09-16 16:11 ` Morten Welinder
2005-09-16 21:36 ` [Was Re: sprintf security holes?] Building on OpenBSD Peter Eriksen
2005-09-19  7:42 ` sprintf security holes? Junio C Hamano
2005-09-19 12:42   ` Sven Verdoolaege

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).