Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Sun, 18 Oct 2015 21:42:53 +0200
From: Florian Weimer <fw@...eb.enyo.de>
To: oss-security@...ts.openwall.com
Subject: Re: CVE request: lldpd crash in lldp_decode due large management address

* Florian Weimer:

> Upstream commit:
>
> <https://github.com/vincentbernat/lldpd/commit/dd4f16e7e816f2165fba76e3d162cd8d2978dcb2>
>
> If compiled with effective source fortification, the vulnerability is
> just a crash and not exploitable for anything else, as a result of the
> compiler-emitted length check for memcpy inside the PEEK_BYTES macro.

There is also another fix, an improper assert leading to a daemon
crash:

https://github.com/vincentbernat/lldpd/commit/793526f8884455f43daecd0a2c46772388417a00

This probably needs a separate CVE ID.

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ