Date: Wed, 19 Dec 2007 02:55:18 +0100 (CET) From: Matthias Andree <matthias.andree@gmx.de> To: FreeBSD-gnats-submit@FreeBSD.org Cc: secteam@FreeBSD.org Subject: ports/118848: [PATCH] security/vuxml: add e2fsprogs <1.40.3 vuln'/CVE-2007-5497 Message-ID: <20071219015518.33AD7C9A1@merlin.emma.line.org> Resent-Message-ID: <200712190200.lBJ209v6086044@freefall.freebsd.org>
next in thread | raw e-mail | index | archive | help
>Number: 118848 >Category: ports >Synopsis: [PATCH] security/vuxml: add e2fsprogs <1.40.3 vuln'/CVE-2007-5497 >Confidential: no >Severity: non-critical >Priority: low >Responsible: freebsd-ports-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: change-request >Submitter-Id: current-users >Arrival-Date: Wed Dec 19 02:00:09 UTC 2007 >Closed-Date: >Last-Modified: >Originator: Matthias Andree >Release: FreeBSD 6.3-PRERELEASE i386 >Organization: >Environment: System: FreeBSD merlin.emma.line.org 6.3-PRERELEASE FreeBSD 6.3-PRERELEASE #13: Wed Dec 5 02:18:57 CET >Description: document CVE-2007-5497/e2fsprogs crash Port maintainer (secteam@FreeBSD.org) is cc'd. Generated with FreeBSD Port Tools 0.77 >How-To-Repeat: >Fix: --- vuxml-1.1_1.patch begins here --- diff -ruN --exclude=CVS /usr/ports/security/vuxml/vuln.xml /usr/home/emma/ports/security/vuxml/vuln.xml --- /usr/ports/security/vuxml/vuln.xml 2007-12-18 14:06:29.000000000 +0100 +++ /usr/home/emma/ports/security/vuxml/vuln.xml 2007-12-19 02:46:53.000000000 +0100 @@ -34,6 +34,42 @@ --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="c78c1057-add2-11dc-8d5b-006097bcc5f4"> + <topic>e2fsprogs -- libext2fs heap buffer overflow crash</topic> + <affects> + <package> + <name>e2fsprogs</name> + <range><lt>1.40.3</lt></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Theodore Y. Ts'o reports:</p> + <blockquote cite="http://sourceforge.net/project/shownotes.php?group_id=2406&release_id=560230"> + <p>Fix a potential security vulnerability where an untrusted + filesystem can be corrupted in such a way that a program using + libext2fs will allocate a buffer which is far too small. This can + lead to either a crash or potentially a heap-based buffer overflow + crash. No known exploits exist, but main concern is where an + untrusted user who possesses privileged access in a guest Xen + environment could corrupt a filesystem which is then accessed by + the pygrub program, running as root in the dom0 host environment, + thus allowing the untrusted user to gain privileged access in the + host OS. Thanks to the McAfee AVERT Research group for reporting + this issue.</p> + </blockquote> + </body> + </description> + <references> + <cvename>CVE-2007-5497</cvename> + <bid>26772</bid> + </references> + <dates> + <discovery>2007-12-07</discovery> + <entry>2007-12-19</entry> + </dates> + </vuln> + <vuln vid="fee7e059-acec-11dc-807f-001b246e4fdf"> <topic>ganglia-webfrontend -- XSS vulnerabilities</topic> <affects> --- vuxml-1.1_1.patch ends here --- >Release-Note: >Audit-Trail: >Unformatted:
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20071219015518.33AD7C9A1>