Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20180406083533.GA3007@localhost>
Date: Fri, 6 Apr 2018 10:35:33 +0200
From: Sebastian Krahmer <half.linked.list@...il.com>
To: oss-security@...ts.openwall.com
Subject: Re: Privsec vuln in beep / Code execution in GNU patch

Hi

 : 
> 
> If anyone knows the background of this please share it.

lulz. There is indeed a double free of console_device,
if a SIGINT is caught right before main() returns.
(Looking at git dbf0b4). Besides the easter egg, the patch
is still wrong. optarg may be reused via console_device, so the strdup()
is OK, but the ressource-free and signal handling isnt.

Shouts to the beep trolls. I strongly challenge the oppinion that security
is better done without it ...

Brave Knights who found issues in such small code base.

lg
-s


-- 

~
~ perl <-> $_='print"\$_=\47$_\47;eval"';eval
~ bash <-> $(curl stealth.openwall.net/null/nuts.txt)

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.