tag 681888 - patch thanks On Fri, Sep 21, 2012 at 06:27:38PM +0200, Arne Wichmann wrote: > tag 681888 + patch > thanks > > There is a fix for CVE-2012-3406 in > https://bugzilla.redhat.com/attachment.cgi?id=594722 >
As already explained earlier before this bug was cloned, I don't think we should use this patch: | I'll add the patches for CVE-2012-3404 and CVE-2012-3405 as they come | from upstream and look correct. For CVE-2012-3406 RedHat, as usual, | hasn't submitted the patch upstream and thus it hasn't been reviewed. I | have looked at it quickly and I have to say I don't really like it. | Replacing a call to alloca() by a call to malloc() without checking the | return value is only a small improvement when the attacker can control | the allocation size. Also it means the attacker can DoS the system or | crash the program. To finish malloc() + memmove() + free() is not the | best way to reallocate big chunks of memory when realloc() exists. | | I am therefore not planning to apply this patch in the current state, | and thus I am cloning this bug to keep this CVE entry separated from the | others. -- Aurelien Jarno GPG: 1024D/F1BCDB73 aurel...@aurel32.net http://www.aurel32.net -- To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org