Hi!

Steve Langasek wrote:
> I've tracked this bug in centericq down to a failure to deal with short
> packets (or packets declaring their own length to be zero).  The attached
> patch fixes this segfault, by stopping without further processing of the
> packet when its length is determined to be zero.

Two words: You rock!

> I don't see any obvious way that this bug could be exploited to gain remote
> access, but unfortunately there may be a non-obvious way...  I've cc:ed the
> security team, so they can evaluate whether this warrants a security upload
> -- perhaps the DoS alone is enough reason for an update.

Crashing arbitrary user applications has been considered a vulnerability
since it's a remote denial of service in this case.  I guess that we should
update.

To Julien: Please let me know the version in sid that will fix this
problem.  I'll provide a CVE name asap.

Regards,

        Joey

-- 
GNU GPL: "The source will be with you... always."

Please always Cc to me when replying to me on the lists.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to