[ros-bugs] [Bug 1095] New: Incorrect variable could cause buffer overflow

ReactOS.Bugzilla at reactos.org ReactOS.Bugzilla at reactos.org
Fri Dec 9 17:41:57 CET 2005


http://www.reactos.org/bugzilla/show_bug.cgi?id=1095

           Summary: Incorrect variable could cause buffer overflow
           Product: ReactOS
           Version: TRUNK
          Platform: x86 Hardware
        OS/Version: ReactOS
            Status: NEW
          Severity: normal
          Priority: P3
         Component: Win32
        AssignedTo: ros-bugs at reactos.org
        ReportedBy: mbealby at gmail.com
         QAContact: ros-bugs at reactos.org


File: reactos/lib/kernel32/debug/output.c
Func: OutputDebugStringA
Line: 400 and 403 (subversion revision 19963)

When checking for a buffer overflow condition nRoundLen is modified. However, in
the memcpy and null-termination code nOutputStringLen is used. Contrast this to
the case of sending to the kernel debugger (lines 414-424) when nRoundLen is used.

I think this is just a simple mistake of using the wrong variable.

-- 
Configure bugmail: http://www.reactos.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.
You are the QA contact for the bug, or are watching the QA contact.


More information about the Ros-bugs mailing list