Jim Meyering <[EMAIL PROTECTED]> writes:

> Andreas Schwab <[EMAIL PROTECTED]> wrote:
>> Jim Meyering <[EMAIL PROTECTED]> writes:
>>
>>> Andreas Schwab <[EMAIL PROTECTED]> wrote:
>>>> Jim Meyering <[EMAIL PROTECTED]> writes:
>>>>
>>>>> I'm interested, because I don't want my applications to segfault on such
>>>>> inputs.  Sure it may look a little far-fetched, but I think it's not.
>>>>> Imagine such a bit pattern being injected into a network data stream
>>>>> that is then printed as a long double.  Just printing an arbitrary
>>>>> "long double" should not make a server vulnerable to a DoS attack.
>>>>
>>>> In which way is this different from passing NULL to strlen?
>>>
>>> I'm surprised to hear you arguing that it is desirable for glibc's printf
>>> implementation to segfault for a long-double with an unusual bit pattern.
>>
>> In which way is this different from printf("%s", (char*)1)?
>
> Posing the question for printf("%s", NULL) wouldn't have made
> the same point, Eh?

You still did not answer my questions.

Andreas.

-- 
Andreas Schwab, SuSE Labs, [EMAIL PROTECTED]
SuSE Linux Products GmbH, Maxfeldstraße 5, 90409 Nürnberg, Germany
PGP key fingerprint = 58CA 54C7 6D53 942B 1756  01D3 44D5 214B 8276 4ED5
"And now for something completely different."


Reply via email to