|
|
Message-ID: <20150728162653.2ae4a3bc@hydrogen.roaringpenguin.com>
Date: Tue, 28 Jul 2015 16:26:53 -0400
From: Dianne Skoll <dfs@...ringpenguin.com>
To: oss-security@...ts.openwall.com
Subject: CVE request - remind 3.1.14 and earlier - buffer overflow
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Hi,
Please issue a CVE number for this vulnerability:
http://lists.roaringpenguin.com/pipermail/remind-fans/2015/003172.html
Patch fixing the problem is below. Remind home page is at
https://www.roaringpenguin.com/products/remind
Regards,
Dianne.
================================================================================
diff --git a/src/var.c b/src/var.c
index 2d68bab..cf933c2 100644
- --- a/src/var.c
+++ b/src/var.c
@@ -757,6 +757,10 @@ static void DumpSysVar(char const *name, const SysVar *v)
if (!v && !name) return; /* Shouldn't happen... */
buffer[0]='$'; buffer[1] = 0;
+ if (name && strlen(name) > VAR_NAME_LEN) {
+ fprintf(ErrFp, "$%s: Name too long\n", name);
+ return;
+ }
if (name) strcat(buffer, name); else strcat(buffer, v->name);
fprintf(ErrFp, "%*s ", VAR_NAME_LEN+1, buffer);
if (v) {
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2
iD8DBQFVt+WRwYQuKhJvQuARAiuOAJwI3Ccvm8ZHwlsP7TrIgFogbbLVoACfQ2sC
qZigZbtWkH64FYjUtbAOTDs=
=oyu4
-----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.