Summary: | <net-mail/qmailadmin-1.2.15: Integer Overflow for user's quota | ||||||
---|---|---|---|---|---|---|---|
Product: | Gentoo Security | Reporter: | Stratos Psomadakis (RETIRED) <psomas> | ||||
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> | ||||
Status: | RESOLVED FIXED | ||||||
Severity: | minor | CC: | ago | ||||
Priority: | Normal | ||||||
Version: | unspecified | ||||||
Hardware: | All | ||||||
OS: | All | ||||||
URL: | http://www.securityfocus.com/archive/1/503375 | ||||||
Whiteboard: | B3 [noglsa] | ||||||
Package list: | Runtime testing required: | --- | |||||
Attachments: |
|
Description
Stratos Psomadakis (RETIRED)
![]() QmailAdmin is prone to several Integer Overflows due that numeric types of more range are needed to store user's quota nowadays(quota over 2GB). Created attachment 197747 [details, diff]
This patch preempts some potential integer overruns.
This patch doesn't fix the integer overrun mentioned in the advisory, but it's a start. Integer conversions now correctly detect and deal with some potential integer overruns in two functions.
I have merged your patch to 1.2.15 now. (In reply to comment #3) > I have merged your patch to 1.2.15 now. > Thank you. Arches, please test and mark stable: =net-mail/qmailadmin-1.2.15 Target keywords : "amd64 arm hppa ppc s390 sh sparc x86" ppc stable amd64 done x86 stable arm stable s390/sh/sparc stable I don't see what's holding up people at bug #353073. There's going to be a point where this situation is untenable. Stable HPPA keywords dropped. @security: go ahead with the vote. Thanks, folks. This looks like a DoS only to me, but I could be wrong. GLSA Vote: no. Agreed, appears to be a DoS only. GLSA vote: no. Change noglsa. |