Package: openser Severity: grave Tags: security Justification: user security hole
OpenPKG fixed a buffer overflow in openser: http://www.openpkg.com/security/advisories/OpenPKG-SA-2006.042.html Patch attached, please upload. Cheers, Moritz -- System Information: Debian Release: 4.0 APT prefers unstable APT policy: (500, 'unstable') Architecture: i386 (i686) Shell: /bin/sh linked to /bin/bash Kernel: Linux 2.6.18-3-686 Locale: LANG=C, [EMAIL PROTECTED] (charmap=ISO-8859-15)
Security Fix (OpenPKG-SA-2006.042, OpenPKG-TT-E1#29) Index: modules/permissions/parse_config.c --- modules/permissions/parse_config.c.orig 2005-06-13 18:47:43 +0200 +++ modules/permissions/parse_config.c 2006-12-26 11:15:25 +0100 @@ -111,8 +111,11 @@ except = strstr(str, " EXCEPT "); if (except) { /* exception found */ - strncpy(str2, str, except-str); - str2[except-str] = '\0'; + int l = except - str; + if (l > sizeof(str2) - 1) + l = sizeof(str2) - 1; + strncpy(str2, str, l); + str2[l] = '\0'; /* except+8 points to the exception */ if (parse_expression_list(except+8, e_exceptions)) { /* error */ @@ -121,7 +124,8 @@ } } else { /* no exception */ - strcpy(str2, str); + strncpy(str2, str, sizeof(str2)-1); + str2[sizeof(str2)-1] = '\0'; *e_exceptions = NULL; }