| Summary: | xterm buffer overflow in -S option fixed upstream in 314 | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | David Walser <luigiwalser> |
| Component: | RPM Packages | Assignee: | QA Team <qa-bugs> |
| Status: | RESOLVED FIXED | QA Contact: | |
| Severity: | normal | ||
| Priority: | Normal | CC: | sysadmin-bugs |
| Version: | 4 | Keywords: | validated_update |
| Target Milestone: | --- | ||
| Hardware: | i586 | ||
| OS: | Linux | ||
| URL: | http://lwn.net/Vulnerabilities/639785/ | ||
| Whiteboard: | has_procedure advisory MGA4-32-OK mga4-64-ok | ||
| Source RPM: | xterm-300-1.mga4.src.rpm | CVE: | |
| Status comment: | |||
|
Description
David Walser
2015-04-09 20:06:10 CEST
Confirmed the crash and the fix for the buffer overflow. General usage is fine. Whiteboard:
(none) =>
has_procedure MGA4-32-OK Before ------ $ xterm -S/dev/pts/20 *** buffer overflow detected ***: xterm terminated ======= Backtrace: ========= ...etc After ----- $ xterm -S/dev/pts/20 xterm: Error 12, errno 9: Bad file descriptor Reason: main: ioctl() failed on F_GETFL Whiteboard:
has_procedure MGA4-32-OK =>
has_procedure MGA4-32-OK mga4-64-ok Validating. Advisory uploaded. Please push to 4 updates Thanks Keywords:
(none) =>
validated_update An update for this issue has been pushed to Mageia Updates repository. http://advisories.mageia.org/MGAA-2015-0036.html Status:
NEW =>
RESOLVED |