forked from deater/linux_logo
-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy pathREADME.SECURITY
More file actions
24 lines (14 loc) · 804 Bytes
/
README.SECURITY
File metadata and controls
24 lines (14 loc) · 804 Bytes
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
It should not be possible to use bugs in linux_logo to compromise a system.
Despite this, I make all attempts to fix buffer overflow and similar problems.
I've done code audits, as well as using fuzzing tools.
To use zzuf (an example. Vary the options as you want)
zzuf -s 1:100000 -C 1 ./linux_logo
If an error is reported, note the "s" and "r" values of the failure.
Assuming a fuzzed /proc/cpuinfo was the cause, with s=5 and r=0.04 do this:
zzuf -s5 -r0.04 < /proc/cpuinfo > out
And then use gdb or other tool o track down the problem when running
linux_logo -e ./out
For some harsher fuzzing:
zzuf -s 1:100000 -r 0.04:1.00 -C 1 ./linux_logo
Fuzz the logo reading code as well:
zzuf -s 1:100000 -r 0.04:1.00 -C 1 -q ./linux_logo -- -D ./logos/classic.logo