From b7d81a9b51dc9008f0678e4ecf98447cfe79b37d Mon Sep 17 00:00:00 2001 From: AnErrupTion Date: Sat, 2 Aug 2025 01:00:56 +0200 Subject: [PATCH] Backport: Fix possible overflow with 5-digit+ UIDs Signed-off-by: AnErrupTion --- src/auth.zig | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/src/auth.zig b/src/auth.zig index 721516f..68204e2 100644 --- a/src/auth.zig +++ b/src/auth.zig @@ -213,7 +213,7 @@ fn setXdgEnv(tty_str: [:0]u8, maybe_desktop_name: ?[:0]const u8, maybe_xdg_deskt // directory. if (builtin.os.tag != .freebsd) { const uid = interop.unistd.getuid(); - var uid_buffer: [10 + @sizeOf(u32) + 1]u8 = undefined; + var uid_buffer: [32]u8 = undefined; // No UID can be larger than this const uid_str = try std.fmt.bufPrintZ(&uid_buffer, "/run/user/{d}", .{uid}); _ = interop.stdlib.setenv("XDG_RUNTIME_DIR", uid_str, 0);