SEGV vulnerability in command-line parser
Bug #2024284 reported by
RW Penney
This bug affects 1 person
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
cryptmount (Ubuntu) |
Confirmed
|
Undecided
|
Unassigned |
Bug Description
There is currently a risk of segmentation-faults (SEGV errors) due to incorrect memory initialization within the command-line parser. This triggers errors when invoking getopt_long(). This bug affects all versions of cryptmount currently available within Ubuntu.
The bug was first flagged here: https:/
The attached patch provides a fix, and is a subset of the relevant commit on cryptmount's upstream GitHub repository.
CVE References
Changed in cryptmount (Ubuntu): | |
status: | New → Confirmed |
To post a comment you must log in.
Hi Ubuntu team.
Any comment on this issue?