[Bug 988918] Re: buffer overflows possible in liblxc

Serge Hallyn 988918 at bugs.launchpad.net
Thu Apr 26 17:44:15 UTC 2012


** Changed in: lxc (Ubuntu Precise)
   Importance: Undecided => High

** Description changed:

  ==============================
  SRU Justification:
  Impact: callers of liblxc (like lxc-ip) can easily get buffer overruns
  Stable fix: will be same as development fix
  Development fix: Change all sprintf calls to snprintf, and check all snprintf return values
-  which can possibly overrun
+  which can possibly overrun
  Test case: call lxc-info with a 300 character container name?
  Regression potential: If this code is not converted correctly, regular container
-  usage can be broken.  The lxc testsuite is being run to make sure there are no
-  regressions with regular container creation and startup.
+  usage can be broken.  The lxc testsuite was run to make sure there are no
+  regressions with regular container creation and startup.  (see
+  lp:~serge-hallyn/+junk/lxc-test)
  ==============================
  Some code in liblxc calls sprintf, or doesn't check return values of snprintf.  Find and fix those.

-- 
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to lxc in Ubuntu.
https://bugs.launchpad.net/bugs/988918

Title:
  buffer overflows possible in liblxc

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/lxc/+bug/988918/+subscriptions



More information about the Ubuntu-server-bugs mailing list