<?xml version="1.0" encoding="UTF-8" ?>

<bugzilla version="5.2"
          urlbase="https://bugzilla.altlinux.org/"
          
          maintainer="jenya@basealt.ru"
>

    <bug>
          <bug_id>25753</bug_id>
          
          <creation_ts>2011-06-13 20:59:38 +0400</creation_ts>
          <short_desc>CVE-2011-2199: buffer overflow in tftp-hpa</short_desc>
          <delta_ts>2011-06-18 01:11:20 +0400</delta_ts>
          <reporter_accessible>1</reporter_accessible>
          <cclist_accessible>1</cclist_accessible>
          <classification_id>4</classification_id>
          <classification>Development</classification>
          <product>Sisyphus</product>
          <component>tftpd</component>
          <version>unstable</version>
          <rep_platform>all</rep_platform>
          <op_sys>Linux</op_sys>
          <bug_status>CLOSED</bug_status>
          <resolution>FIXED</resolution>
          
          
          <bug_file_loc>http://openwall.com/lists/oss-security/2011/06/11/1</bug_file_loc>
          <status_whiteboard></status_whiteboard>
          <keywords>security</keywords>
          <priority>P3</priority>
          <bug_severity>critical</bug_severity>
          <target_milestone>---</target_milestone>
          
          
          <everconfirmed>1</everconfirmed>
          <reporter name="Dmitry V. Levin">ldv</reporter>
          <assigned_to name="Sergey Bolshakov">sbolshakov</assigned_to>
          <cc>mike</cc>
    
    <cc>sbolshakov</cc>
          
          <qa_contact>qa-sisyphus</qa_contact>

      

      

      

          <comment_sort_order>oldest_to_newest</comment_sort_order>  
          <long_desc isprivate="0" >
    <commentid>122110</commentid>
    <comment_count>0</comment_count>
    <who name="Dmitry V. Levin">ldv</who>
    <bug_when>2011-06-13 20:59:38 +0400</bug_when>
    <thetext>&quot;The tftp-hpa daemon contained a buffer overflow vulnerability in the
function for setting the utimeout option. As the daemon accepts this
option from clients, the buffer overflow can be remotely exploited.&quot;</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>122114</commentid>
    <comment_count>1</comment_count>
    <who name="Dmitry V. Levin">ldv</who>
    <bug_when>2011-06-14 01:23:07 +0400</bug_when>
    <thetext>Here is the gitweb URL for that patch:
http://git.kernel.org/?p=network/tftp/tftp-hpa.git;a=commitdiff;h=f3035c45bc50bb5cac87ca01e7ef6a12485184f8</thetext>
  </long_desc><long_desc isprivate="0" >
    <commentid>122168</commentid>
    <comment_count>2</comment_count>
    <who name="Michael Shigorin">mike</who>
    <bug_when>2011-06-18 01:11:20 +0400</bug_when>
    <thetext>tftp - The client for the Trivial File Transfer Protocol (TFTP)
* Tue Jun 14 2011 Damir Shayhutdinov &lt;damir@altlinux&gt; 5.0-alt3
- Fix buffer overflow in utimeout option (CVE 2011-2199, closes #25753)</thetext>
  </long_desc>
      
      

    </bug>

</bugzilla>