Hi,
Yes I think I did submitted it to upstream.
I don't have a particular patch, but I believe it is trivial to add a
check for the overflow.
Thanks,
Sang Kil
On Sat, Nov 30, 2013 at 3:40 AM, Charles Plessy wrote:
> Le Sun, Nov 10, 2013 at 09:20:08PM -0500, Sang Kil Cha a écrit :
&g
to the public BTS as well. So if
you think this program is not on the attack surface, then please
ignore the report.
Thanks,
Sang Kil
On Mon, Nov 11, 2013 at 4:21 AM, Steinar H. Gunderson
wrote:
> On Sun, Nov 10, 2013 at 09:19:30PM -0500, Sang Kil Cha wrote:
>> Package: pvm-dev
>>
I concur. We thought they are different bugs, but it was our mistake.
On Mon, Nov 11, 2013 at 9:02 AM, Steinar H. Gunderson
wrote:
> On Mon, Nov 11, 2013 at 08:54:02AM -0500, Sang Kil Cha wrote:
>> I was running a tool called Mayhem on linux binaries to find vulnerabilities.
>>
Package: trueprint
Version: 5.3-4
Severity: grave
Tags: security
Justification: user security hole
trueprint has a buffer overflow vulnerability. A PoC file is attached.
$ /usr/bin/trueprint foo
Program received signal SIGSEGV, Segmentation fault.
0xbf81 in ?? ()
(gdb)
-- System Informat
Package: pvm-dev
Version: 3.4.5-12.5
Severity: grave
Tags: security
Justification: user security hole
trcsort has a buffer overflow vulnerability. A PoC file is attached.
Command line to reproduce the bug:
$ /usr/bin/trcsort foo
-- System Information:
Debian Release: 7.1
APT prefers stable
Package: mpeg3-utils
Version: 1.5.4-5
Severity: grave
Tags: security
Justification: user security hole
mpeg3cat has a buffer overflow vulnerability. A PoC file is attached.
gdb --args /usr/bin/mpeg3cat foo.mp3
Program received signal SIGSEGV, Segmentation fault.
0x41414141 in ?? ()
(gdb)
--
Package: binutils-h8300-hms
Version: 2.16.1-8
Severity: grave
Tags: security
Justification: user security hole
h8300-hitachi-coff-size has a buffer overflow vulnerability. A PoC file is
attached.
$ gdb --args /usr/bin/h8300-hitachi-coff-size foo
Program received signal SIGSEGV, Segmentation faul
Package: imview
Version: 1.1.9c-9
Severity: grave
Tags: security
imview has stack smashing vulnerability when parsing ics header @
io/readics.cxx:320
/* get the filename from the ICS file */
t = temp1;
while (*bp != delim2)
*t++ = *bp++;
This bug
Package: latd
Version: 1.30
Severity: critical
Tags: security
-- System Information:
Debian Release: 7.0
APT prefers testing
APT policy: (500, 'testing')
Architecture: amd64 (x86_64)
Foreign Architectures: i386
Kernel: Linux 3.2.0-4-amd64 (SMP w/2 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTY
9 matches
Mail list logo