Common Vulnerabilities and Exposures assigned an identifier CVE-2008-5396 to
the following vulnerability:
Array index error in the (1) torisa.c and (2) dahdi/tor2.c drivers in
Zaptel (aka DAHDI) 1.4.11 and earlier allows local users in the
dialout group to overwrite an integer value in kernel memory by
writing to /dev/zap/ctl, related to missing validation of the sync
field associated with the ZT_SPANCONFIG ioctl.
This issue affects all versions of the zaptel package, as shipped
with Fedora releases of 8, 9 and 10.
This issue affects the version of the zaptel package, as shipped
with Fedora Extra Packages for Enterprise Linux 5 (EPEL 5) project.
Please update the packages.
There looks to be an array index overflow problem in the upstream tor2 patch.
Have brought forward upstream with this issue in:
(In reply to comment #4)
> There looks to be an array index overflow problem in the upstream tor2 patch.
> Have brought forward upstream with this issue in:
The issue has been addressed in upstream:
I'm bit confused here. Affected files are indeed part of the zaptel SRPM, but according to the build logs, they are not built or shipped in any of the (binary) RPMS. The code does not seem to be part of the upstream kernel, and Fedora does no longer permit shipping kernel modules packages. Can anyone clarify this? This looks like notabug for Fedora.
Yes, Fedora only ships the userspace libraries. The zaptel/dadhi modules are not in the upstream kernel and Fedora prohibits kernel modules shipped outside of the kernel RPM.
I'd agree this is notabug.
Jeffrey, thanks for quick confirmation! Closing.