|
Message-ID: <20140409131230.GA18549@suse.de> Date: Wed, 9 Apr 2014 15:12:30 +0200 From: Sebastian Krahmer <krahmer@...e.de> To: oss-security@...ts.openwall.com Subject: pam_cifscreds stack overflow Hi We are tracking a patch at: https://bugzilla.novell.com/show_bug.cgi?id=870168 which fixes a overflow in the cifskey.c (taken from Linux CIFS VFS) as used in pam_cifscreds. I did not check upstream length checking during their packet processing but I doubt the same fixed max length's also apply ad-hoc to pam processing of user and password. Sebastian -- ~ perl self.pl ~ $_='print"\$_=\47$_\47;eval"';eval ~ krahmer@...e.de - SuSE Security Team
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.