Impact
The urandom1 plugin, has a heap buffer overwrite vulnerability at boot which leads to it overwriting other parts of the heap, possibly causing random instabilities and undefined behavior.
The urandom plugin is enabled by default, so this bug affects everyone using Finit 4.2, or later, that do not explicitly disable the plugin at build time.
Patches
This bug is fixed in Finit 4.12.
Workarounds
If you cannot upgrade, or backport the fix to urandom.c, it is strongly recommended to disable the plugin in the call to the configure script.
References
None.
Impact
The urandom1 plugin, has a heap buffer overwrite vulnerability at boot which leads to it overwriting other parts of the heap, possibly causing random instabilities and undefined behavior.
The urandom plugin is enabled by default, so this bug affects everyone using Finit 4.2, or later, that do not explicitly disable the plugin at build time.
Patches
This bug is fixed in Finit 4.12.
Workarounds
If you cannot upgrade, or backport the fix to urandom.c, it is strongly recommended to disable the plugin in the call to the
configurescript.References
None.
Footnotes
urandom.sois responsible for saving random seed data at shutdown and seeding/dev/urandomat boot from the previously saved data. ↩