Fix buffer overflow vulnerability. Release 1.0.14.

This commit is contained in:
Andrew Sobala
2003-05-11 14:36:55 +00:00
parent 34abd9ae80
commit 012ae5faea
4 changed files with 14 additions and 1 deletions

View File

@@ -1,3 +1,7 @@
2003-05-11 Andrew Sobala <aes@gnome.org>
* up version to 1.0.14
2002-12-11 Stanislav Brabec <sbrabec@suse.cz>
* sysdeps/guile/Makefile.am, sysdeps/guile/names/Makefile.am:

View File

@@ -8,7 +8,7 @@
#
LIBGTOP_MAJOR_VERSION=1
LIBGTOP_MINOR_VERSION=0
LIBGTOP_MICRO_VERSION=13
LIBGTOP_MICRO_VERSION=14
LIBGTOP_INTERFACE_AGE=12
LIBGTOP_BINARY_AGE=12

View File

@@ -1,3 +1,7 @@
2003-05-11 Andrew Sobala <aes@gnome.org>
* gnuserv.c: (permitted): fix buffer overflow vulnerability
2001-11-26 Kevin Vandersloot <kfv101@psu.edu>
* gnuserv.c: Apply patch fixing security issue from

View File

@@ -200,6 +200,11 @@ permitted (u_long host_addr, int fd)
auth_data_len = atoi (buf);
if (auth_data_len < 1 || auth_data_len > sizeof(buf)) {
syslog_message(LOG_WARNING, "Invalid data length supplied by client");
return FALSE;
}
if (timed_read (fd, buf, auth_data_len, AUTH_TIMEOUT, 0) != auth_data_len)
return FALSE;