[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Security bug in CAPI code; please test updates



There is a potential buffer overflow in logging of CAPI messages in
libcapi20 (part of isdnutils; bug 408530). The same broken code from
libcapi20 is present in the Linux kernel (bug 411294). Also, the
affected functions are not thread-safe and are unlikely to be made so
without API changes; multithreaded programs calling them must use a
mutex to avoid another security flaw; (such as asterisk-chan-capi; bug
411293).

I have prepared updates of asterisk-chan-capi and isdnutils for sarge
and sid but I have no ISDN hardware to test them with. I would
appreciate it if users of these packages would test the updates and
report their results to the associated bugs.

The patches can be found attached to the bug reports. Updated packages
are at:

deb http://womble.decadent.org.uk/debian/ distribution/
deb-src http://womble.decadent.org.uk/debian/ distribution/

(the repository is signed with my personal GPG key).

Ben.

-- 
Ben Hutchings
The obvious mathematical breakthrough [to break modern encryption] would be
development of an easy way to factor large prime numbers. - Bill Gates

Attachment: signature.asc
Description: This is a digitally signed message part


Reply to: