Control: retitle -1 leptonlib: CVE-2018-7186: Stack buffer overflows
Control: tags -1 + patch
Hi,
On Thu, Feb 15, 2018 at 01:34:04PM -0800, Jeff Breidenbach wrote:
> This is just about strings, right? So something like this will fix the
> problem
> and resolve this bug? Or am I missing something?
Processing control commands:
> retitle -1 leptonlib: CVE-2018-7186: Stack buffer overflows
Bug #890548 [src:leptonlib] Stack buffer overflows
Changed Bug title to 'leptonlib: CVE-2018-7186: Stack buffer overflows' from
'Stack buffer overflows'.
> tags -1 + patch
Bug #890548 [src:leptonlib] lepton
This is just about strings, right? So something like this will fix the
problem
and resolve this bug? Or am I missing something?
char buf[L_BUF_SIZE];
- fscanf(fp, "Rootname: %s\n", buf);
+ fscanf(fp, "Rootname: %L_BUF_SIZE_MINUS_ONEs%\n", buf);
Source: leptonlib
Version: 1.74.4-2
Severity: serious
Tags: security upstream
gplotRead() and ptaReadStream() read strings into stack buffers using
fscanf() without a length limit.
Ben.
-- System Information:
Debian Release: buster/sid
APT prefers unstable-debug
APT policy: (500, 'unstable-d
4 matches
Mail list logo