[Secure-testing-team] [Secure-testing-commits] r12708 - data/CVE

Nico Golde debian-secure-testing+ml at ngolde.de
Mon Aug 31 02:14:52 UTC 2009


Hi,
* Michael S Gilbert <michael.s.gilbert at gmail.com> [2009-08-31 03:47]:
> On Mon, 31 Aug 2009 03:09:02 +0200 Nico Golde wrote:
> > * Michael S Gilbert <michael.s.gilbert at gmail.com> [2009-08-31 02:29]:
> > > On Mon, 31 Aug 2009 00:23:00 +0200 Nico Golde wrote:
> > > 
> > > > * Michael Gilbert <gilbert-guest at alioth.debian.org> [2009-08-30 19:06]:
> > > > > Author: gilbert-guest
> > > > > Date: 2009-08-30 17:09:16 +0000 (Sun, 30 Aug 2009)
> > > > > New Revision: 12708
> > > > > 
> > > > > Modified:
> > > > >    data/CVE/list
> > > > > Log:
> > > > > beginning of embedded code copies triage (5 down 395 to go)
> > > > > 
> > > > > Modified: data/CVE/list
> > > > > ===================================================================
> > > > > --- data/CVE/list	2009-08-30 03:00:07 UTC (rev 12707)
> > > > > +++ data/CVE/list	2009-08-30 17:09:16 UTC (rev 12708)
> > > > > @@ -1286,6 +1286,7 @@
> > > > >  CVE-2009-2660 (Multiple integer overflows in CamlImages 2.2 might allow ...)
> > > > >  	{DSA-1857-1}
> > > > >  	- camlimages 1:3.0.1-3 (medium; bug #540146)
> > > > > +	- advi <not-affected> (affected code section not present in advi code copy of camlimages)
> > > > >  CVE-2009-2657 (nilfs-utils before 2.0.14 installs multiple programs with unnecessary ...)
> > > > >  	- nilfs2-tools <not-affected> (dh_fixperms removes the setuid and setgid bits from all files)
> > > > >  CVE-2009-2656 (Unspecified vulnerability in the com.android.phone process in Android ...)
> > > > > @@ -1303,6 +1304,8 @@
> > > > >  CVE-2009-XXXX [VLC: integer underflow in Real RTSP]
> > > > >  	- vlc 1.0.1-1
> > > > >  	- mplayer <unfixed>
> > > > > +	- xine-lib <unfixed>
> > > > > +        NOTE: affected mplayer code copy present in xine-lib
> > > > 
> > > > Did you only check if the code is present or also if it's 
> > > > used?
> > > 
> > > yes, i only checked that the embedded code is present.  after further
> > > review of the full disclosure posting, it is clear that xine-lib is not
> > > affected because it has additional an additional check.
> > 
> > I wasn't talking about this issue in specific, just noticed 
> > it in this commit. If you didn't do that yet please do so to 
> > avoid lots of false-positives and someone needs to do the 
> > work anyway.
> 
> if the affected code is present, isn't it almost always the case that
> it is actually used?  the only situation where this isn't the case (that
> i can think of right now) is dead code, which the maintainer should
> probably be working with upstream to remove anyway.

Yes unfortunately dead code is still a problem.

> would it be ok for me to add a 'TODO: <x> code copy present, check
> whether it is used' when i find that the code copy is in the package?

Yes sure

> figuring out whether the affected code is present in these 400
> instances is already quite an undertaking, and it will be significantly
> more work to parse all the make files to determine if that code gets
> built and gets called from somewhere.  i would hope others may be
> willing/able to help out at that point?

That would be definitely good! At the moment I don't have 
that much time but I hope I can do more soon and maybe I'll 
join the fun.

Cheers
Nico
-- 
Nico Golde - http://www.ngolde.de - nion at jabber.ccc.de - GPG: 0xA0A0AAAA
For security reasons, all text in this mail is double-rot13 encrypted.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 197 bytes
Desc: not available
URL: <http://lists.alioth.debian.org/pipermail/secure-testing-team/attachments/20090831/40526e22/attachment-0001.pgp>


More information about the Secure-testing-team mailing list