Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Mon, 13 Jun 2011 15:14:24 -0400 (EDT)
From: Josh Bressers <>
Cc: coley <>
Subject: Re: CVE request: buffer overflow in tftp-hpa

----- Original Message -----
> The tftp-hpa daemon contained a buffer overflow vulnerability in the
> function for setting the utimeout option. As the daemon accepts this
> option from clients, the buffer overflow can be remotely exploited.
> For a patch, see
> > git clone
> > git diff 2864 f303

Here is the gitweb URL for that patch:;a=commitdiff;h=f3035c45bc50bb5cac87ca01e7ef6a12485184f8

Please use CVE-2011-2199.



Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ