Paul Bijnens wrote:
> On 2008-09-05 17:11, SM wrote:
>   
>> At 01:11 05-09-2008, Tilman Schmidt wrote:
>>     
>>> But even a manual "yum update" finds nothing to update. I cannot
>>> imagine Redhat/CentOS neglecting to provide a patch for that
>>>       
>> Why not? :-)
>>
>> The response was that "this issue can only result in a crash of the 
>> bunzip2 process, which we do not consider to have any security impact."
>>
>>     
>>> vulnerability, so I am probably doing something wrong. But what?
>>>       
>> You are not doing anything wrong.  Get a newer version of bzip2.
>>     
>
>
> I believe the situation is this:
>
> Apparently Redhat believes it is not a security bug:
>
> https://bugzilla.redhat.com/show_bug.cgi?id=438118#c6
>
> The crashing of bzip2 itself is not a security bug.  But clamav
> (which is NOT included in the package list by RedHat) uses bzip2
> to unpack an archive and assert no harmful content is inside.
> Clamav cannot verify such an archive in this case.  This could be
> used by a virusmaker to bypass the virusscanner on the mailserver.
>
> There exist updated bzip2 packages for FC7 and FC8.
>
> When some Real Paying Customer for Redhat Enterprise logs a bug, and
> convinces them it *is* a security bug, then the machinery for
> backporting the fix will be started, I guess, resulting in a fixed
> bzip2 for the RHEL series (or is this wishful thinking?).
>
>
>   
Rhetorical question: Why does it have to be a _security_ bug in order 
for redhat to fix it?

-- 
Roberto Ullfig - [EMAIL PROTECTED]

_______________________________________________
Help us build a comprehensive ClamAV guide: visit http://wiki.clamav.net
http://www.clamav.net/support/ml

Reply via email to