https://bugs.winehq.org/show_bug.cgi?id=54376 Bug ID: 54376 Summary: ws2_32:sock - test_reuseaddr() overflows a sockaddr variable by reading an AF_INET6 peer name into it Product: Wine Version: 8.0 Hardware: x86-64 OS: Linux Status: UNCONFIRMED Severity: normal Priority: P2 Component: winsock Assignee: wine-bugs(a)winehq.org Reporter: jinoh.kang.kr(a)gmail.com CC: pgofman(a)codeweavers.com Regression SHA1: c6da691926c418697ab982a284228772837a4be2 Distribution: --- ws2_32:sock - test_reuseaddr() overflows a sockaddr variable (saddr) by passing it as a peer name buffer to accept() on an IPv6 TCP listener socket, which then assumes that the buffer is at least as large as struct sockaddr_in6. -- Do not reply to this email, post in Bugzilla using the above URL to reply. You are receiving this mail because: You are watching all bug changes.