Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Sun, 18 Oct 2015 21:42:53 +0200
From: Florian Weimer <>
Subject: Re: CVE request: lldpd crash in lldp_decode due large management address

* Florian Weimer:

> Upstream commit:
> <>
> If compiled with effective source fortification, the vulnerability is
> just a crash and not exploitable for anything else, as a result of the
> compiler-emitted length check for memcpy inside the PEEK_BYTES macro.

There is also another fix, an improper assert leading to a daemon

This probably needs a separate CVE ID.

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ