Hi!
Steve Langasek wrote:
> I've tracked this bug in centericq down to a failure to deal with short
> packets (or packets declaring their own length to be zero). The attached
> patch fixes this segfault, by stopping without further processing of the
> packet when its length is determined to be zero.
Two words: You rock!
> I don't see any obvious way that this bug could be exploited to gain remote
> access, but unfortunately there may be a non-obvious way... I've cc:ed the
> security team, so they can evaluate whether this warrants a security upload
> -- perhaps the DoS alone is enough reason for an update.
Crashing arbitrary user applications has been considered a vulnerability
since it's a remote denial of service in this case. I guess that we should
update.
To Julien: Please let me know the version in sid that will fix this
problem. I'll provide a CVE name asap.
Regards,
Joey
--
GNU GPL: "The source will be with you... always."
Please always Cc to me when replying to me on the lists.
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]