Bug#886776: genisoimage: Buffer Overflow found in isoinfo executable

2018-07-27 Thread Bernhard Übelacker
Hello, I tried to reproduce the stack smashing. But found that the current package in Debian amd64 testing looks like it was not build with -fstack-protector-strong. So could it be that your report was using a local rebuilt package? Nevertheless it looks like the local variable testname has just

Bug#886776: genisoimage: Buffer Overflow found in isoinfo executable

2018-01-09 Thread Julian Jackson
Package: genisoimage Version: 9:1.1.11-3+b2 Severity: normal Tags: security Dear Maintainer, Fuzzing the isoinfo binary from genisoimage using afl-fuzz identified a vulnerable function, parse_dir which contains a buffer overflow vulnerability. This seems to be related to the length of idr->name