Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 06 Apr 2008 23:01:28 +0100
From:      Adrian Portelli <adrianp@stindustries.net>
To:        "Simon L. Nielsen" <simon@FreeBSD.org>
Cc:        freebsd-security@freebsd.org, stheg olloydson <stheg_olloydson@yahoo.com>
Subject:   Re: CVE-2008-1391 - Multiple BSD Platforms "strfmon()" Function  Integer Overflow
Message-ID:  <47F94838.6060105@stindustries.net>
In-Reply-To: <20080406205506.GE1127@FreeBSD.org>
References:  <185727.37681.qm@web32704.mail.mud.yahoo.com> <20080406205506.GE1127@FreeBSD.org>

next in thread | previous in thread | raw e-mail | index | archive | help

Simon L. Nielsen wrote:
> On 2008.04.06 12:47:11 -0700, stheg olloydson wrote:
> 
>> According to the information at mitre.org, both 6.x and 7.0 are
>> vulnerable. I see in NetBSD's CVS log for
>> src/lib/libc/stdlib/strfmon.c, they have patched this on March
>> 27.
> 
> Note that the change in NetBSD is possibly incomplete to fix the
> issue.  I'm not sure what the final conclusion was on that.
> 

The final conclusion was a subsequent commit on the 27th:

http://archive.netbsd.se/?ml=netbsd-source-changes&a=2008-03&m=6750722
http://archive.netbsd.se/?ml=netbsd-source-changes&a=2008-03&m=6846592

We're still in the process of getting the changes pulled up.

adrian.



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?47F94838.6060105>