[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#993588: wily: Potential Buffer Overflow in libmsg/connect.c



Package: wily
Version: 0.13.41
Severity: normal

Dear Maintainer,

It seems that there exists a potential Buffer Overflow in libmsg/connect.c.
In line 184, and 191,
(184) if(!(disp = getenv("DISPLAY"))) {
...
(191) sprintf(buf, "%s/wily%s%s", dir, pw->pw_name, disp);

the variable disp is a previously stored path by external source.
If the length of disp is large enough in sprintf, this may cause Buffer Overflow.


-- System Information:
Debian Release: 11.0
  APT prefers oldstable-updates
  APT policy: (500, 'oldstable-updates'), (500, 'oldstable')
Architecture: amd64 (x86_64)

Kernel: Linux 4.4.0-19041-Microsoft
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), LANGUAGE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: unable to detect


Reply to: