Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Mon, 19 May 2014 10:42:58 -0500
From: Kent Baxley <>
Subject: CVE request, multiple vulnerabilities in openwsman


A recent security code review was performed on openwsman version 2.4.3
and several issues were identified and fixed in version 2.4.4.

Can we please get CVEs assigned to them?

The full list is here, in the section dated February 27, 2014:

I have broken each one down by commit here:

ws_xml_make_default_prefix() can overflow buf parameter via sprintf()

wsmc_create_request() potential buf[20] overflow via WSMAN_ACTION_RENEW

LocalSubscriptionOpUpdate() unchecked fopen()

Incorrect order of sanity guards in wsman_get_fault_status_from_doc()

Unchecked memory allocation in wsman_init_plugins(), p->ifc

Unchecked memory allocation in mem_double(), newptr

Unchecked memory allocation in dictionary_new(), d, d->val, d->key, d->hash

Unchecked memory allocation in u_error_new(), *error

Remove (unsafe) debug() call from sighup_handler


Kent Baxley
Field Engineer, Canonical

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.