Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Thu, 7 Apr 2011 15:17:37 -0400
From: (Christos Zoulas)
To: Vincent Danen <>,,
Subject: Re: Possible security fixes in 5.05?

On Apr 7, 11:37am, (Vincent Danen) wrote:
-- Subject: Re: [oss-security] Possible security fixes in 5.05?

| Looks like there are a few issues here:
| 2011-01-16  19:31  Reuben Thomas <rrt at>
|      * Fix two potential buffer overruns in apprentice_list.

This is an order of evaluation issue, that could read memory over the allocated
limit. The limit check is done after the read instead of before. The code
has not been present in any release.

| 2010-09-20  15:24  Reuben Thomas <rrt at>
|      * Minor security fix to softmagic.c (don't use untrusted
|        string as printf format).

The code is present in [5.00-5.04]. It should not be an issue because the desc
printf formats are checked during parsing. It is mostly to silence a compiler
warning for printf(ms->desc) -> printf("%s", ms->desc). The code does
printf(ms->desc, argument) in a ton of other places.


Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.