On Sun, Jun 10, 2007 at 03:11:10PM +0000, Daniel Baumann wrote:
> > Integer overflow in the "file" program 4.20, when running on 32-bit
> > systems, might allow user-assisted attackers to execute arbitrary code
> > via a large file that triggers an overflow that bypasses an assert()
> > statement. NOTE: this issue is due to an incorrect patch for
> > CVE-2007-1536.
> 
> As file 4.21 is not affected, only sarge and needs an update. Sending the 
> proposed package to the security team now.

This bug was filed against version 4.21-1 (which is in
testing/unstable), but it marked as only affecting etch.

I guess the 4.21-1 should be removed from the found version 
list, and added to the fixed list?  (And the etch tag can then
also be removed.)


Kurt



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to