Skip to content

Commit

Permalink
security/vuxml: Document buffer overflow in korean/hcode
Browse files Browse the repository at this point in the history
Before ko-hcode-2.1.3_2, the port was affected by CVE-2024-34020, where
a buffer overflow can be exploited to (at least) crash the program.
  • Loading branch information
ephemeralriggs committed May 1, 2024
1 parent 483d9e2 commit 55d99e0
Showing 1 changed file with 26 additions and 0 deletions.
26 changes: 26 additions & 0 deletions security/vuxml/vuln/2024.xml
Original file line number Diff line number Diff line change
@@ -1,3 +1,29 @@
<vuln vid="da4adc02-07f4-11ef-960d-5404a68ad561">
<topic>hcode -- buffer overflow in mail.c</topic>
<affects>
<package>
<name>ko-hcode</name>
<range><lt>2.1.3_2</lt></range>
</package>
</affects>
<description>
<body xmlns="http://www.w3.org/1999/xhtml">
<p>The openSUSE project reports:</p>
<blockquote cite="https://bugzilla.suse.com/show_bug.cgi?id=1223534">
<p>The problematic function in question is putSDN() in mail.c. The static variable `cp` is used as an index for a fixed-sized buffer `ibuf`. There is a range check: `if ( cp >= HDR_BUF_LEN ) ...` but under certain circumstances, cp can be incremented beyond the buffer size, leading to a buffer overwrite</p>
</blockquote>
</body>
</description>
<references>
<cvename>CVE-2024-34020</cvename>
<url>https://bugzilla.suse.com/show_bug.cgi?id=1223534</url>
</references>
<dates>
<discovery>2024-04-29</discovery>
<entry>2024-05-01</entry>
</dates>
</vuln>

<vuln vid="5da8b1e6-0591-11ef-9e00-080027957747">
<topic>GLPI -- multiple vulnerabilities</topic>
<affects>
Expand Down

0 comments on commit 55d99e0

Please sign in to comment.