On Mon, Feb 27, 2012 at 09:44:04PM +0000, Dominic Hargreaves wrote:
> Source: libtfbs-perl
> Severity: normal
> Version: 0.5.svn.20100421-1
> User: debian...@lists.debian.org
> Usertags: hardening-format-security hardening
> 
> With hardening flags enabled, this package FTBFS:
> 
> ./lib/pwm_searchPFF.c: In function 'announce':
> ./lib/pwm_searchPFF.c:124:4: error: format not a string literal and no format 
> arguments [-Werror=format-security]

All calls of this function are conditional on the __DEBUG__ preprocessor
constant, which is defined to 0 in Ext/lib/pwm_search.h. Additionally,
all the calls except one are with one fixed argument. However, it looks
like the call in get_sequence() would probably be vulnerable if __DEBUG__
were enabled.

The compiled shared object usr/lib/perl5/auto/TFBS/Ext/pwmsearch/pwmsearch.so
exports the 'announce' symbol, so it might be used by other software in
a vulnerable way. However, the only reverse dependency, med-bio-dev from
the debian-med source package, does not reference it anywhere AFAICS.

So there doesn't seem to be any real security impact, at least on
unstable.  I did glance through the stable versions too and the situation
seems identical.

In any case, the fix is trivial, just change
 fprintf(stderr,msg);
to
 fprintf(stderr,"%s",msg);

Cheers,
-- 
Niko Tyni   nt...@debian.org



-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to