Bug#919589: libkxl0: Buffer-overflow with potential security issue
Emmanuel Fleury
emmanuel.fleury at u-bordeaux.fr
Fri Jan 18 12:36:57 GMT 2019
Hello,
On 1/18/19 1:26 AM, Bernhard Übelacker wrote:
>
> I tried to have a look and found following unconditional sprintf.
> Attached patch is an attempt to respect the size of
> variable KXL_DName.
>
> The suid bit seems really to access /var/games/geki2.scores.
>
> What the security implications of this bug are I cannot say.
Well, I think it would cost more time to discover it than just applying
the patch and fixing it. So, let this bug die and go to the next one. :)
Regards
--
Emmanuel Fleury
Rule of Diversity: Distrust all claims for "one true way".
-- Eric S. Raymond (The Art of Unix Programming)
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <http://alioth-lists.debian.net/pipermail/pkg-games-devel/attachments/20190118/e850a697/attachment.sig>
More information about the Pkg-games-devel
mailing list