Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Mon, 13 Jun 2011 15:14:24 -0400 (EDT)
From: Josh Bressers <bressers@...hat.com>
To: oss-security@...ts.openwall.com
Cc: coley <coley@...re.org>
Subject: Re: CVE request: buffer overflow in tftp-hpa



----- Original Message -----
> The tftp-hpa daemon contained a buffer overflow vulnerability in the
> function for setting the utimeout option. As the daemon accepts this
> option from clients, the buffer overflow can be remotely exploited.
> 
> For a patch, see
> 
> > git clone http://www.kernel.org/pub/scm/network/tftp/tftp-hpa.git/
> > git diff 2864 f303
> 

Here is the gitweb URL for that patch:
http://git.kernel.org/?p=network/tftp/tftp-hpa.git;a=commitdiff;h=f3035c45bc50bb5cac87ca01e7ef6a12485184f8

Please use CVE-2011-2199.

Thanks.

-- 
    JB

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ