From c05c32c5beb5ee94d7de6e1129add52024492a70 Mon Sep 17 00:00:00 2001 From: AnErrupTion Date: Sat, 2 Aug 2025 00:57:22 +0200 Subject: [PATCH] Fix possible overflow with 5-digit+ UIDs (c.f. #684) Signed-off-by: AnErrupTion --- src/auth.zig | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/src/auth.zig b/src/auth.zig index 0b468da..370a2be 100644 --- a/src/auth.zig +++ b/src/auth.zig @@ -211,7 +211,7 @@ fn setXdgEnv(tty_str: [:0]u8, environment: Environment) !void { // directory. if (builtin.os.tag != .freebsd) { const uid = interop.unistd.getuid(); - var uid_buffer: [10 + @sizeOf(u32) + 1]u8 = undefined; + var uid_buffer: [32]u8 = undefined; // No UID can be larger than this const uid_str = try std.fmt.bufPrintZ(&uid_buffer, "/run/user/{d}", .{uid}); _ = interop.stdlib.setenv("XDG_RUNTIME_DIR", uid_str, 0);