Hi Jan

Thanks for applying the patch to address CVE-2016-6318.

Note though that there is still a second issue, and as noted by Daniel
Lange it was as well applied in SuSE. I verfied that with that patch
as well no heap-overflow is triggered anymore.

Could you please as well apply it? I can otherwise do a NMU.

Regards,
Salvatore
The input word is guaranteed to be at most STRINGSIZE-1 in length. One of the
mangle operations involves duplicating the input word, resulting in a string
twice the length to be accommodated by both area variables.

Howard Guo <h...@suse.com> 2016-08-17

diff -rupN 3/lib/rules.c 3-patched/lib/rules.c
--- 3/lib/rules.c	2016-08-16 14:16:24.033261876 +0200
+++ 3-patched/lib/rules.c	2016-08-17 13:57:14.485782894 +0200
@@ -434,9 +434,8 @@ Mangle(input, control)		/* returns a poi
 {
     int limit;
     register char *ptr;
-    static char area[STRINGSIZE];
-    char area2[STRINGSIZE];
-    area[0] = '\0';
+    static char area[STRINGSIZE * 2] = {0};
+    char area2[STRINGSIZE * 2] = {0};
     strcpy(area, input);
 
     for (ptr = control; *ptr; ptr++)

Attachment: signature.asc
Description: PGP signature

Reply via email to