public inbox for glibc-bugs@sourceware.org
help / color / mirror / Atom feed
* [Bug network/18724] New: Harden put*ent functions against data injection
@ 2015-07-27 12:26 fweimer at redhat dot com
  2015-07-27 12:26 ` [Bug network/18724] " fweimer at redhat dot com
                   ` (4 more replies)
  0 siblings, 5 replies; 6+ messages in thread
From: fweimer at redhat dot com @ 2015-07-27 12:26 UTC (permalink / raw)
  To: glibc-bugs

https://sourceware.org/bugzilla/show_bug.cgi?id=18724

            Bug ID: 18724
           Summary: Harden put*ent functions against data injection
           Product: glibc
           Version: 2.21
            Status: NEW
          Severity: normal
          Priority: P2
         Component: network
          Assignee: fweimer at redhat dot com
          Reporter: fweimer at redhat dot com
  Target Milestone: ---
             Flags: security-

putpwent, putspent and similar functions should check the values they write for
newlines and ':' characters to avoid data injection.

This is just hardening, no known security impact.  Known callers of putpwent
implement the checks themselves.

-- 
You are receiving this mail because:
You are on the CC list for the bug.


^ permalink raw reply	[flat|nested] 6+ messages in thread

end of thread, other threads:[~2015-10-29 16:38 UTC | newest]

Thread overview: 6+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2015-07-27 12:26 [Bug network/18724] New: Harden put*ent functions against data injection fweimer at redhat dot com
2015-07-27 12:26 ` [Bug network/18724] " fweimer at redhat dot com
2015-08-27 21:53 ` [Bug libc/18724] " jsm28 at gcc dot gnu.org
2015-10-02  9:35 ` cvs-commit at gcc dot gnu.org
2015-10-02  9:36 ` fweimer at redhat dot com
2015-10-29 16:38 ` jsm28 at gcc dot gnu.org

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).