Bug 19470 - ping buffer problems: netkit-base shares iputils code base
ping buffer problems: netkit-base shares iputils code base
Product: Red Hat Linux
Classification: Retired
Component: netkit-base (Show other bugs)
i386 Linux
high Severity medium
: ---
: ---
Assigned To: Jeff Johnson
: Security
Depends On:
  Show dependency treegraph
Reported: 2000-10-20 13:07 EDT by Pekka Savola
Modified: 2008-05-01 11:37 EDT (History)
2 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Last Closed: 2000-10-21 11:30:56 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---

Attachments (Terms of Use)

  None (edit)
Description Pekka Savola 2000-10-20 13:07:12 EDT
A. Kuznetsov's iputils is based on netkit-base.  A quick glance at netkit-base source
would seem to indicate that static buffer problems (and naturally root dropping) are
still there in netkit-base.

Perhaps there should be an errata release which would tell people to move to inetd + iputils?

IF this is done, this would be a good place to fix the close-wait DoS issue if daytime server
is being used (#16729) -- a patch is available.
Comment 1 Chris Evans 2000-10-21 11:30:54 EDT
Hmm - I believe RedHat6.0 shipped with a patch closing the static buffer
overflow issue.
It is called "ping-overflow.patch".

In summary: I think RH6.0 ping is safe as shipped.

Note You need to log in before you can comment on or make changes to this bug.