Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Thu, 13 Mar 2014 14:19:19 +0100
From: Marcus Meissner <>
To: OSS Security List <>
Subject: CVE request for icinga 1 byte \0 overflows


I am not sure whether this needs a CVE...

The icinga team silently fixed some single byte \0 overflows.;a=commitdiff;h=73285093b71a5551abdaab0a042d3d6bae093b0d

(also the non public
is referenced by commit above)

I think they all go via strcpy() into known sized stack buffers, so should
be caught by FORTIFY_SOURCE.

Probably still needs a CVE.

Ciao, Marcus

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ