On Tue, Oct 11, 2011 at 21:27:08 +0200, Moritz Mühlenhoff wrote:

> On Mon, Oct 10, 2011 at 10:09:27PM +0100, Jonathan Wiltshire wrote:
> > On Sat, Jul 30, 2011 at 12:12:08AM +0200, Moritz Mühlenhoff wrote:
> > > On Fri, Jul 29, 2011 at 07:05:06PM +0200, Jordi Mallach wrote:
> > > 
> > > > I have prepared a package in SVN which is ready for upload. Before doing
> > > > so, Moritz, can you look at this additional patch I found in the 2.4 SVN
> > > > branch?
> > > > 
> > > > svn diff -r4780:4781 
> > > > svn://svn.clusterresources.com/torque/branches/2.4-fixes
> > > > 
> > > > What do you think, should we add that too? There are no additional CVEs
> > > > for Torque, apparently so maybe this can't be used as an attack vector?
> > > 
> > > Whether this is exploitable depends very much on the context and I'm not
> > > familiar with torque, but we should include the fix to err on the safe 
> > > side.
> > >  
> > > > Packages (without this second patch) are in my homedir in people.d.o, 
> > > > and
> > > > signed. I'm going offline until monday morning, so if you check them out
> > > > and see everything looks good, feel free to move them to the queue.
> > > 
> > > I'm leaving from DebConf shortly and won't be having proper internet
> > > access for a few days. Please upload the packages when you find the
> > > time, we can then process the DSA.
> > 
> > As this bug is ageing quite nicely I've taken the liberty of uploading
> > Jordi's package with the additional patch folded in to security-master.
> > 
> > The changelog:
> > 
> > torque (2.4.8+dfsg-9squeeze1) squeeze-security; urgency=low
> > 
> >   [ Jordi Mallach ]
> >   * [CVE_2011_2193]: Fix two potential buffer overflows:
> >     jobid length and hostname length weren't properly checked,
> >     and these both allow segfaults/buffer overflow attacks within
> >     the code.
> >   * Update Vcs-* fields to point to the new squeeze branch.
> > 
> >   [ Jonathan Wiltshire ]
> >   * Non-maintainer upload.
> >   * buffer_overflow_in_checkpoint_c.patch: Fix a potential buffer
> >     overflow problem in mom_checkpoint_recover 
> > 
> > It has had only limited testing because I don't have the resources
> > available for a thorough test.
> 
> There's a new issue, which should be included:
> http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2907
> 
Hi,

is there any progress on fixing these issues?

Cheers,
Julien



--
To UNSUBSCRIBE, email to debian-bugs-rc-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to