https://bugs.winehq.org/show_bug.cgi?id=54376
Bug ID: 54376 Summary: ws2_32:sock - test_reuseaddr() overflows a sockaddr variable by reading an AF_INET6 peer name into it Product: Wine Version: 8.0 Hardware: x86-64 OS: Linux Status: UNCONFIRMED Severity: normal Priority: P2 Component: winsock Assignee: wine-bugs@winehq.org Reporter: jinoh.kang.kr@gmail.com CC: pgofman@codeweavers.com Regression SHA1: c6da691926c418697ab982a284228772837a4be2 Distribution: ---
ws2_32:sock - test_reuseaddr() overflows a sockaddr variable (saddr) by passing it as a peer name buffer to accept() on an IPv6 TCP listener socket, which then assumes that the buffer is at least as large as struct sockaddr_in6.