[Secure-testing-team] Re: Bug#322273: [CAN-2005-2456]: XFRM array
index buffer overflow
Moritz Muehlenhoff
jmm at inutil.org
Wed Aug 10 09:47:12 UTC 2005
Horms wrote:
> As for which package to log a bug against, or cretion of duplicate bugs.
> To be honest it doesn't matter. If you email
> debian-kernel at lists.debian.org, then you should get a response,
> regardless of if you open a bug in the BTS or not.
> CCing secure-testing-team at lists.alioth.debian.org if its a bug testing
> and team at security.debian.org if its a bug instable is also a good idea.
>
> When we find problems, we just fix them. The BTS is really a bit to
> noisy for us to use it to track bugs effectively. Obviously this
> is a bit of a problem, but what I am trying to say is adding a bug
> to the BTS just emails debian-kernel anyway, and security bugs
> sent there are acted on. So my my advice is tho email the addresses
> above, and if you want to open a bug, just open it against any
> of the above packages that have the vulnerability.
Hi Horms,
there has been a CVE assignment for an overflow in xdr.c, which can be
exploited by crafted data in the nfsacl protocol: CAN-2005-2500
Please see http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2500
for some links to patches. I suspect it is already fixed in kernel-2.6,
but 2.6.8 and 2.4.27 might need backports.
Cheers,
Moritz
More information about the Secure-testing-team
mailing list