[Top][All Lists]
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: Buffer overflow in gnutls-serv http code
From: |
Simon Josefsson |
Subject: |
Re: Buffer overflow in gnutls-serv http code |
Date: |
Tue, 07 Dec 2010 08:31:21 +0100 |
User-agent: |
Gnus/5.110011 (No Gnus v0.11) Emacs/23.2 (gnu/linux) |
Tomas Mraz <address@hidden> writes:
> The gnutls-serv uses fixed allocated buffer for the response which can
> be pretty long if a client certificate is presented to it and the http
> header is large. This causes buffer overflow and heap corruption which
> then leads to random segfaults or aborts.
>
> It was reported originally here:
> https://bugzilla.redhat.com/show_bug.cgi?id=659259
>
> The attached patch changes sprintf calls in peer_print_info() to
> snprintf so the buffer is never overflowed.
Thanks -- for copyright reasons, did you do this on RedHat time?
Otherwise the RedHat copyright assignment doesn't cover it, and I
couldn't find an individual assignment.
/Simon