Bug#919589: libkxl0: Buffer-overflow with potential security issue

Emmanuel Fleury emmanuel.fleury at u-bordeaux.fr
Fri Jan 18 12:36:57 GMT 2019


Hello,

On 1/18/19 1:26 AM, Bernhard Übelacker wrote:
> 
> I tried to have a look and found following unconditional sprintf.
> Attached patch is an attempt to respect the size of
> variable KXL_DName.
> 
> The suid bit seems really to access /var/games/geki2.scores.
> 
> What the security implications of this bug are I cannot say.

Well, I think it would cost more time to discover it than just applying
the patch and fixing it. So, let this bug die and go to the next one. :)

Regards
-- 
Emmanuel Fleury

Rule of Diversity: Distrust all claims for "one true way".
  -- Eric S. Raymond (The Art of Unix Programming)

-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <http://alioth-lists.debian.net/pipermail/pkg-games-devel/attachments/20190118/e850a697/attachment.sig>


More information about the Pkg-games-devel mailing list