Bug 152962

Summary: CAN-2005-1194 Buffer overflow in the ieee_putascii() function
Product: Red Hat Enterprise Linux 4 Reporter: Josh Bressers <bressers>
Component: nasmAssignee: Richard Henderson <rth>
Status: CLOSED ERRATA QA Contact: Brian Brock <bbrock>
Severity: low Docs Contact:
Priority: medium    
Version: 4.0Keywords: Security
Target Milestone: ---   
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard: impact=low,public=20050331,source=redhat,reported=20050331
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2005-05-04 15:01:18 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description Josh Bressers 2005-03-31 14:18:18 UTC
There is a very obvious buffer overflow in ieee_putascii()

(code truncated)

static void ieee_putascii(char *format, ...)
    char buffer[256];
    vsprintf(buffer, format, ap);

At the very least it should be using a vsnprintf.

Comment 1 Josh Bressers 2005-03-31 14:18:44 UTC
This issue should also affect RHEL2.1 and RHEL3

Comment 2 Jindrich Novy 2005-04-15 13:02:49 UTC
Affects RHEL2.1, RHEL3, RHEL4. The fix is now applied for all the RHELs.

Comment 3 Josh Bressers 2005-05-04 15:01:18 UTC
An advisory has been issued which should help the problem
described in this bug report. This report is therefore being
closed with a resolution of ERRATA. For more information
on the solution and/or where to find the updated files,
please follow the link below. You may reopen this bug report
if the solution does not work for you.

http://rhn.redhat.com/errata/RHSA-2005-381.html