Re: [hackers] [st][PATCH] Fix buffer overflow when handling composed input

From: NRK <nrk_AT_disroot.org>
Date: Mon, 24 Oct 2022 16:30:42 +0600

On Mon, Oct 24, 2022 at 01:10:29PM +0300, Santtu Lakkala wrote:
> The dynmaic[sic] version incorrectly passes sizeof(buf), where buf is char
> *, as the size of buffer in the "happy case" leading to unnecessary hits to
> the dynamic path.

Ah yes, the classic. Attached ammended version of the dynmaic patch.
A bit more invasive (but hopefully correct) than the previous patch.

- NRK

Received on Mon Oct 24 2022 - 12:30:42 CEST

This archive was generated by hypermail 2.3.0 : Mon Oct 24 2022 - 12:36:34 CEST