Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Thu, 13 Mar 2014 14:19:19 +0100
From: Marcus Meissner <meissner@...e.de>
To: OSS Security List <oss-security@...ts.openwall.com>
Subject: CVE request for icinga 1 byte \0 overflows

Hi,

I am not sure whether this needs a CVE...

The icinga team silently fixed some single byte \0 overflows.

https://git.icinga.org/?p=icinga-core.git;a=commitdiff;h=73285093b71a5551abdaab0a042d3d6bae093b0d

(also the non public
https://dev.icinga.org/issues/5663
is referenced by commit above)


I think they all go via strcpy() into known sized stack buffers, so should
be caught by FORTIFY_SOURCE.

Probably still needs a CVE.

Ciao, Marcus

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ