Re: [SECURITY] [DSA 1422-1] New e2fsprogs packages fix arbitrary code execution

2007-12-16 Thread Moritz Muehlenhoff
Juan Gallego wrote: > is sarge affected by this vulnerability? or has sarge been archived and i > missed the announcement? The main attack vector - pygrub/xen - doesn't exist in Sarge. The other attacks are more or less theoretical and hardly justify modifications to an important core package lik

Re: [SECURITY] [DSA 1422-1] New e2fsprogs packages fix arbitrary code execution

2007-12-14 Thread Nico Golde
Hi Steve, * Steve Kemp <[EMAIL PROTECTED]> [2007-12-07 20:26]: > On Fri Dec 07, 2007 at 18:41:35 +0100, Nico Golde wrote: > > What about those, are they unimportant? > > They are still present in the etch code. I stumbled > > upon them while preparing a testing-security upload. > > Uknown. I us

Re: [SECURITY] [DSA 1422-1] New e2fsprogs packages fix arbitrary code execution

2007-12-08 Thread Nico Golde
Hi Steve, * Steve Kemp <[EMAIL PROTECTED]> [2007-12-07 20:26]: > On Fri Dec 07, 2007 at 18:41:35 +0100, Nico Golde wrote: > > > What about those, are they unimportant? > > They are still present in the etch code. I stumbled > > upon them while preparing a testing-security upload. > > Uknown. I

Re: [SECURITY] [DSA 1422-1] New e2fsprogs packages fix arbitrary code execution

2007-12-07 Thread Steve Kemp
On Fri Dec 07, 2007 at 18:41:35 +0100, Nico Golde wrote: > What about those, are they unimportant? > They are still present in the etch code. I stumbled > upon them while preparing a testing-security upload. Uknown. I used the patch provided by Theodore Tso, which he is/was planning on using

Re: [SECURITY] [DSA 1422-1] New e2fsprogs packages fix arbitrary code execution

2007-12-07 Thread Nico Golde
Hi, * Nico Golde <[EMAIL PROTECTED]> [2007-12-07 18:32]: [...] > > Rafal Wojtczuk of McAfee AVERT Research discovered that e2fsprogs, > > ext2 file system utilities and libraries, contained multiple > > integer overflows in memory allocations, based on sizes taken directly > > from filesystem info

Re: [SECURITY] [DSA 1422-1] New e2fsprogs packages fix arbitrary code execution

2007-12-07 Thread Nico Golde
Hi Steve, * Steve Kemp <[EMAIL PROTECTED]> [2007-12-07 14:32]: > > Debian Security Advisory DSA-1422[EMAIL PROTECTED] > http://www.debian.org/security/ Steve Kemp > December 07

Re: [SECURITY] [DSA 1422-1] New e2fsprogs packages fix arbitrary code execution

2007-12-07 Thread Steve Kemp
On Fri Dec 07, 2007 at 09:46:21 -0500, Juan Gallego wrote: > | For the stable distribution (etch), this problem has been fixed in version > | 1.39+1.40-WIP-2006.11.14+dfsg-2etch1. > > | For the unstable distribution (sid), this problem will be fixed shortly. > is sarge affected by this vulnerabi

Re: [SECURITY] [DSA 1422-1] New e2fsprogs packages fix arbitrary code execution

2007-12-07 Thread Juan Gallego
On 2007-12-07 13:21-, Steve Kemp <[EMAIL PROTECTED]> wrote: | For the stable distribution (etch), this problem has been fixed in version | 1.39+1.40-WIP-2006.11.14+dfsg-2etch1. | For the unstable distribution (sid), this problem will be fixed shortly. hi Steve and others, is sarge affected