Summary: | net-im/centericq: buffer overflow through vulnerable ktools lib | ||||||
---|---|---|---|---|---|---|---|
Product: | Gentoo Security | Reporter: | Thierry Carrez (RETIRED) <koon> | ||||
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> | ||||
Status: | RESOLVED FIXED | ||||||
Severity: | normal | CC: | wschlich | ||||
Priority: | High | ||||||
Version: | unspecified | ||||||
Hardware: | All | ||||||
OS: | Linux | ||||||
URL: | http://www.zone-h.org/en/advisories/read/id=8480/ | ||||||
Whiteboard: | B2? [glsa] | ||||||
Package list: | Runtime testing required: | --- | |||||
Bug Depends on: | |||||||
Bug Blocks: | 100519, 113683 | ||||||
Attachments: |
|
Description
Thierry Carrez (RETIRED)
2005-11-30 08:22:17 UTC
Could someone design a patch (auditors ?) Created attachment 74654 [details, diff]
patch for overflow
This doesnt look like legal c, isnt he setting c to point to an automatic array
no longer in scope?
Anyway, here's a fix.
Wolfram: please test and bump with provided patch Compiled fine on my x86 box, committed =net-im/centericq-4.21.0-r2 archmasked. Thx for the bump, arches please test and mark -r2 stable. sparc stable. Stable on ppc. x86 done amd64 done GLSA 200512-11 |