Commit a23a1fb0 authored by Colin Ian King's avatar Colin Ian King Committed by Seth Forshee

UBUNTU: SAUCE: KEYS: ensure xbuf is large enough to fix buffer overflow in...

UBUNTU: SAUCE: KEYS: ensure xbuf is large enough to fix buffer overflow in proc_keys_show (LP: #1634496)

BugLink: http://bugs.launchpad.net/bugs/1634496

CVE-2016-7042

When stack protect is enabled xbuf is too small for timeout data causing a
buffer overflow and a stack protector corruption report.

OriginalAuthor: Vladis Dronov <vdronov@redhat.com>
OriginalLocation: https://bugzilla.redhat.com/attachment.cgi?id=1200212&action=diffSigned-off-by: default avatarColin Ian King <colin.king@canonical.com>
Acked-by: default avatarTim Gardner <tim.gardner@canonical.com>
Signed-off-by: default avatarSeth Forshee <seth.forshee@canonical.com>
parent df69860a
......@@ -181,7 +181,7 @@ static int proc_keys_show(struct seq_file *m, void *v)
struct timespec now;
unsigned long timo;
key_ref_t key_ref, skey_ref;
char xbuf[12];
char xbuf[16];
int rc;
struct keyring_search_context ctx = {
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment