~ubuntu-branches/ubuntu/utopic/linuxlogo/utopic-proposed

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
It should not be possible to use bugs in linux_logo to compromise a system.
Despite this, I make all attempts to fix buffer overflow and similar problems.

I've done code audits, as well as using fuzzing tools.

To use zzuf (an example.  Vary the options as you want)
   zzuf -s 1:100000 -C 1 ./linux_logo
   
If an error is reported, note the "s" and "r" values of the failure.

Assuming a fuzzed /proc/cpuinfo was the cause, with s=5 and r=0.04 do this:
   zzuf -s5 -r0.04 < /proc/cpuinfo > out
   
And then use gdb or other tool o track down the problem when running
   linux_logo -e ./out
   

For some harsher fuzzing:
   zzuf -s 1:100000 -r 0.04:1.00 -C 1 ./linux_logo
   
Fuzz the logo reading code as well:
   zzuf -s 1:100000 -r 0.04:1.00 -C 1 -q ./linux_logo -- -D ./logos/classic.logo