Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Date: Fri, 11 Jan 2019 23:44:28 +0530
From: Dhiraj Mishra <>
Subject: SEGV in libIEC61850 protocol

Hi List,

## Summary:
An issue has been found in libIEC61850 v1.3.1. Ethernet_setProtocolFilter
in hal/ethernet/linux/ethernet_linux.c has a SEGV, as demonstrated by
sv_subscriber_example.c and sv_subscriber.c.

## Snip code from sv_subscriber.c#L186
    else {
            printf("SV_SUBSCRIBER: Starting SV receiver failed for
interface %s\n", self->interfaceId);

## Memory leak:

Using interface eth0
Error creating raw socket!
==1403==ERROR: AddressSanitizer: SEGV on unknown address 0x00000000000a (pc
0x55b5675c1284 bp 0x7f92623fee30 sp 0x7f92623fee20 T1)
==1403==The signal is caused by a WRITE memory access.
==1403==Hint: address points to the zero page.
    #0 0x55b5675c1283 in Ethernet_setProtocolFilter
    #1 0x55b5675ba75f in SVReceiver_startThreadless
    #2 0x55b5675ba3b7 in svReceiverLoop
    #3 0x55b5675c1720 in destroyAutomaticThread
    #4 0x7f9265c976da in start_thread
    #5 0x7f92659c088e in __clone (/lib/x86_64-linux-gnu/

AddressSanitizer can not provide additional info.
SUMMARY: AddressSanitizer: SEGV
/home/input0/Desktop/libiec61850/hal/ethernet/linux/ethernet_linux.c:209 in
Thread T1 created by T0 here:
    #0 0x7f9265ee6d2f in __interceptor_pthread_create
    #1 0x55b5675c17ab in Thread_start
    #2 0x55b5675ba49a in SVReceiver_start
    #3 0x55b5675b9eec in main
    #4 0x7f92658c0b96 in __libc_start_main


Later CVE-2019-6136 was assigned to this.

Thank you

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.