Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <20171003152213.u6zlrgu3nb7yk7ng@eldamar.local>
Date: Tue, 3 Oct 2017 17:22:13 +0200
From: Salvatore Bonaccorso <carnil@...ian.org>
To: oss-security@...ts.openwall.com
Subject: Re: CVE Request: FreeBSD kernel, double-fetch bug in
 smb_strdupin

Hi

On Tue, Oct 03, 2017 at 02:39:55PM +0000, Xu, Meng wrote:
> Hello,
> 
> In function  smb_strdupin()  of file sys/netsmb/smb_subr.c,
> smb_strdupin() tried to roll a copyin() based strlen to allocate a buffer
> and then blindly copyin that size.  Of course, a malicious user program
> could simultaneously manipulate the buffer, resulting in a non-terminated
> string being copied.
> 
> Bug report: https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=222687
> Patch: https://svnweb.freebsd.org/base?view=revision&revision=324102
> 
> Please help assign a CVE to it.

CVE's are not anymore requested via the oss-security list. If you want
to request one please have a look at https://cveform.mitre.org/

Once you have the CVE assigned, can you please loop back the
assignement in this thread?

Regards,
Salvatore

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.