Bug 27217
Summary: | crontab buffer overflows on names over 20 chars | ||
---|---|---|---|
Product: | [Retired] Red Hat Linux | Reporter: | Chris Ricker <chris.ricker> |
Component: | vixie-cron | Assignee: | Crutcher Dunnavant <crutcher> |
Status: | CLOSED RAWHIDE | QA Contact: | David Lawrence <dkl> |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | 7.1 | CC: | dr |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2001-04-10 21:59:42 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
Chris Ricker
2001-02-12 22:26:01 UTC
*** Bug 27216 has been marked as a duplicate of this bug. *** Fixed in -61. This defect is considered MUST-FIX for Florence Release-Candidate #1 Does this bug also affect RH 6.x? Sort of. It overflows the buffer, but manages not to crash. Hm, but I guess there will be a security errata release for all releases? I'm not sure there's a need to. Sure, buffer overflows, esp. in suid programs are never good, but how could you exploit this particular one? I don't know, but better safe than sorry. IMNSHO. |