Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Fri, 13 Jul 2018 16:40:52 +0200
From: Markus Wichmann <nullplan@....net>
To: musl@...ts.openwall.com
Subject: Possible oversight in setvbuf()

Hi all,

ungetc() seems to depend on f->buf pointing UNGET bytes into a valid
array. fdopen() will provide such a thing. However, setvbuf() will set
f->buf to the very start of the user provided buffer. Bizarrely, UNGET
is deducted from the buffer size, but not added to the pointer.
Oversight or intentional?

Ciao,
Markus

Powered by blists - more mailing lists

Your e-mail address:

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.