[Secure-testing-commits] r7545 - data/CVE

Nico Golde debian-secure-testing+ml at ngolde.de
Fri Dec 7 16:35:06 UTC 2007


Hi,
* dom at alioth.debian.org <dom at alioth.debian.org> [2007-12-07 17:20]:
> Author: dom
> Date: 2007-12-07 16:17:48 +0000 (Fri, 07 Dec 2007)
> New Revision: 7545
[...] 
> -CVE-2007-5497
> -	RESERVED
> +CVE-2007-5497 (Multiple integer overflows in libext2fs in e2fsprogs ...)
> +	- e2fsprogs 1.37-2sarge1

Please read the narrative_introduction before commiting to 
the svn, please. sarge entries need a sarge tag.

> +	- e2fsprogs 1.39+1.40-WIP-2006.11.14+dfsg-2

Where did you get this information from?
From what I can see the fix by Novell (namely 
e2fsprogs-VUL0_integer_overflow.patch from what I can see) 
is not fixed in unstable.

Kind regards
Nico
-- 
Nico Golde - http://www.ngolde.de - nion at jabber.ccc.de - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: not available
Url : http://lists.alioth.debian.org/pipermail/secure-testing-commits/attachments/20071207/42418c2c/attachment.pgp 


More information about the Secure-testing-commits mailing list