On 20/03/2025 07:42, Alex PWN wrote:
Hi, my name is Alex Feklin (PwnToday).
In coreutils I found interesting vulnerability in who.c

"
err = asprintf (&buf,
     "%-8s"
     "%s"
     " %-12s"
     " %-*s"
     "%s"
     "%s"
     " %-8s"
     "%s"
     ,
     user ? user : " .",
     include_mesg ? mesg : "",
     line,
     time_format_width,
     time_str,
     x_idle,
     x_pid,
     comment,
     x_exitstr
);
"

The "comment" argument is taken from user input and passed unsafely to
asprintf, which opens the possibility of a format string attack.

Use the safe option: quote(comment)

Write back
Thanks

Sorry I don't see the vulnerability,
as "comment" is interpreted with "%-8s".
What am I missing?
Did a tool flag this?

thank you,
Pádraig



Reply via email to