severity 395248 serious
tags 395248 upstream
kthxbye

"Sam Hocevar (Debian packages)" <[EMAIL PROTECTED]> writes:

> ngrep's signal handler, clean_exit(), calls free() and other cleanup
> functions in a non-idempotent way.

Good catch, thanks for the report.

> This is probably a security issue, too, because the data ngrep is
> handling comes from the network, but it does not seem to be easily
> exploitable (famous last words, I know).

At least the various pointers that are double-free'd aren't used for
data that comes from the network...  They also should be reset to NULL,
but that would still leave a (shorter) race condition.

I agree that this is potentially a security issue, so I'm raising the
severity of this report to 'serious'.

I asked ngrep's upstream maintainer for comments, let's see what he
thinks about the problem and your proposed fix.

Thanks,

-- 
  ,''`.
 : :' :        Romain Francoise <[EMAIL PROTECTED]>
 `. `'         http://people.debian.org/~rfrancoise/
   `-


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to