buffer overruns in pidfile handling

Bug #1119977 reported by Seth Arnold
256
This bug affects 1 person
Affects Status Importance Assigned to Milestone
vde2 (Ubuntu)
Triaged
Undecided
Unassigned

Bug Description

static void save_pidfile()
{
        if(pidfile[0] != '/')
                strncat(pidfile_path, pidfile, PATH_MAX - strlen(pidfile_path));
        else
                strcpy(pidfile_path, pidfile);

If programs with this definition are executed with -p <more than PATH_MAX chars>, the pidfile_path heap array is overflowed and undefined behavior, including potential security problems, can result.

This code is duplicated in the following files:

src/vde_autolink.c
src/vde_pcapplug.c
src/vde_plug2tap.c
src/wirefilter.c
src/kvde_switch/consmgmt.c
src/slirpvde/slirpvde.c
src/vde_switch/consmgmt.c

Revision history for this message
Seth Arnold (seth-arnold) wrote :
Changed in vde2 (Ubuntu):
status: New → Triaged
information type: Private Security → Public Security
To post a comment you must log in.
This report contains Public Security information  
Everyone can see this security related information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.