Package: openser
Severity: grave
Tags: security
Justification: user security hole

OpenPKG fixed a buffer overflow in openser:
http://www.openpkg.com/security/advisories/OpenPKG-SA-2006.042.html

Patch attached, please upload.

Cheers,
        Moritz

-- System Information:
Debian Release: 4.0
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.18-3-686
Locale: LANG=C, [EMAIL PROTECTED] (charmap=ISO-8859-15)
Security Fix (OpenPKG-SA-2006.042, OpenPKG-TT-E1#29)

Index: modules/permissions/parse_config.c
--- modules/permissions/parse_config.c.orig	2005-06-13 18:47:43 +0200
+++ modules/permissions/parse_config.c	2006-12-26 11:15:25 +0100
@@ -111,8 +111,11 @@
 	except = strstr(str, " EXCEPT ");
 	if (except) {
 		/* exception found */
-		strncpy(str2, str, except-str);
-		str2[except-str] = '\0';
+		int l = except - str;
+		if (l > sizeof(str2) - 1)
+			l = sizeof(str2) - 1;
+		strncpy(str2, str, l);
+		str2[l] = '\0';
 		/* except+8 points to the exception */
 		if (parse_expression_list(except+8, e_exceptions)) {
 			/* error */
@@ -121,7 +124,8 @@
 		}
 	} else {
 		/* no exception */
-		strcpy(str2, str);
+		strncpy(str2, str, sizeof(str2)-1);
+		str2[sizeof(str2)-1] = '\0';
 		*e_exceptions = NULL;
 	}
 	

Reply via email to