lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <1078562690.2637.15.camel@limit.tm.in> From: balwinder at gmx.net (Balwinder Singh) Subject: EFC Released > Although I appriciate ideas to enhance security concerning buffer > overflows or format string bugs, i cannot understand why to find > the following lines in etc_db_new.c including your package: > > <snip> > char pwd[MAX_PATH_LEN]; > ... > i = 0; > while((ch = fgetc(strace_file)) != '\0') { > pwd[i] = ch; > i++; > } > ... > </snip> > Haven't found any made borders. And yes, due to its permissions it won't > let people become root ... it is just a cosmetic failure. (hopefully) :) > Moreover, and that is the actual reason for replying your mail ... > I couldn't find the patch in $EFC_PATH/efc/ ... did I just download a > non complete package? > Thanks for pointing out the problems. Both problems have been corrected in 1.0.2 version. Please get the newer version of EFC from sourceforge. Regards Bal
Powered by blists - more mailing lists