Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <loom.20160614T103255-750@post.gmane.org>
Date: Tue, 14 Jun 2016 08:39:05 +0000 (UTC)
From: Petter Reinholdtsen <pere@...gry.com>
To: oss-security@...ts.openwall.com
Subject: Re: CVE request: reads out-of-bounds with cpio 2.11

>> Two reads out-of-bounds in cpio 2.11 were found in the parsing of cpio
>> files

Note, testing with valgrind show that after the out-of-bounds reads,
there is an out-of-bounds write too.  The issue is triggered by a
file name length of zero in an internal data structure.  This cases
the code to do operations on a buffer returned by malloc(0), first a memory
access, then a memory write and finally a lstat().

I've send the valgrind output and a patch to fix it to
<URL: http://bugs.debian.org/815965 > and upstream.

I have no idea if the issue is a security issue, though.  I could not
come up with a way to use the unwanted reads and writes for anything
interesting.
-- 
Happy hacking
Petter Reinholdtsen


Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.