Hi Theodore,
I fixed this issue in testing-security. The patch I attached
first and the one used in the stable DSA is incomplete in my
opinion. Attached is a complete fix for this used in the
testing-security upload.
Kind regards
Nico
--
Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] -
Package: e2fsprogs
Version: 1.37-2sarge1
Severity: grave
Tags: security patch
Hi,
the following CVE (Common Vulnerabilities & Exposures) id was
published for e2fsprogs.
CVE-2007-5497[0]:
| Multiple integer overflows in libext2fs in e2fsprogs allow
| user-assisted remote attackers to execute arbit
2 matches
Mail list logo