Hi, On Thu, 22 Nov 2018 21:35:39 +0100 Salvatore Bonaccorso <car...@debian.org> wrote: > Source: sysstat > Version: 12.0.1-1 > Severity: important > Tags: security upstream > Forwarded: https://github.com/sysstat/sysstat/issues/196 > > Hi, > > The following vulnerability was published for sysstat. [...]
I can't reproduce the issue on Jessie. By executing the POC with sadf stack_oob I get Invalid system activity file: stack_oob File created by sar/sadc from sysstat version 48.48.48.48 Current sysstat version can no longer read the format of this file (0x2175) Looking closer at the affected source code I see that the vulnerable function remap_struct was first introduced on 22.9.2017. https://github.com/sysstat/sysstat/commit/65ac30359e49ee717397e39950d7c24a6610d57c#diff-cccb0877d1539c562536a98e0d17428f Hence I think Jessie is not affected. If I am correct then Stretch should be safe as well, double-checking that would be appreciated. Regards, Markus
signature.asc
Description: OpenPGP digital signature