aboutsummaryrefslogtreecommitdiffstats
path: root/meta-networking/recipes-irc/znc
diff options
context:
space:
mode:
authorJulius Hemanth Pitti <jpitti@cisco.com>2020-07-20 15:19:46 -0700
committerArmin Kuster <akuster808@gmail.com>2020-07-29 22:44:52 -0700
commitb4be735fdb1bbc97e147739c217ad5b62e74fa61 (patch)
tree377c34d50718c923ca6ea325da0459d1ddd2e4cb /meta-networking/recipes-irc/znc
parentfd0d398fe70f8ea109f7a9efa5b13bfff1a70bd0 (diff)
downloadmeta-openembedded-b4be735fdb1bbc97e147739c217ad5b62e74fa61.tar.gz
netkit-telnetd: Fix buffer overflow in netoprintf
netoprintf() was not handling a case where return value of vsnprintf is greater than "size"(2nd argument), results in buffer overflow while adjusting "nfrontp" pointer to point beyond "netobuf" buffer. Here is one such case where "nfrontp" crossed boundaries of "netobuf", and pointing to another global variable. (gdb) p &netobuf[8255] $5 = 0x55c93afe8b1f <netobuf+8255> "" (gdb) p nfrontp $6 = 0x55c93afe8c20 <terminaltype> "\377" (gdb) p &terminaltype $7 = (char **) 0x55c93afe8c20 <terminaltype> (gdb) This resulted in crash of telnetd service with segmentation fault. Signed-off-by: Julius Hemanth Pitti <jpitti@cisco.com> Signed-off-by: Khem Raj <raj.khem@gmail.com> (cherry picked from commit 232b82afd405c526f822294509e1d32388544ed4) [appears to be CVE-2020-10188] Signed-off-by: Armin Kuster <akuster808@gmail.com>
Diffstat (limited to 'meta-networking/recipes-irc/znc')
0 files changed, 0 insertions, 0 deletions