|
Bugzilla – Full Text Bug Listing |
| Summary: | VUL-0: CVE-2005-0815: potential iso9660 problems | ||
|---|---|---|---|
| Product: | [Novell Products] SUSE Security Incidents | Reporter: | Ludwig Nussel <lnussel> |
| Component: | Incidents | Assignee: | Hubert Mantel <mantel> |
| Status: | RESOLVED WONTFIX | QA Contact: | Security Team bot <security-team> |
| Severity: | Normal | ||
| Priority: | P5 - None | CC: | klaus, security-team, smueller |
| Version: | unspecified | ||
| Target Milestone: | --- | ||
| Hardware: | Other | ||
| OS: | All | ||
| Whiteboard: | CVE-2005-0815: CVSS v2 Base Score: 6.4 (AV:N/AC:L/Au:N/C:N/I:P/A:P) | ||
| Found By: | Other | Services Priority: | |
| Business Priority: | Blocker: | --- | |
| Marketing QA Status: | --- | IT Deployment: | --- |
| Attachments: | his program, exchanges random bytes | ||
|
Description
Ludwig Nussel
2005-03-18 10:06:37 UTC
Created attachment 32273 [details]
his program, exchanges random bytes
Well, since this requires the attacked to mount a specially prepared filesystem, it should not be that severe... you mean like inserting a CD into a machine? There are a number of different ways to upset the kernel with crafted filesystem images. I don't consider this severe enough for a security update. CAN-2005-0815 Date: Mon, 21 Mar 2005 20:48:58 +0000 (GMT) From: Mark J Cox <mjc@redhat.com> To: Chris Wright <chrisw@osdl.org> Cc: Mike O'Connor <mjo@dojo.mi.org>, vendor-sec List <vendor-sec@lst.de> Subject: Re: [vendor-sec] Re: Linux ISO9660 handling flaws > It's got a copy of the message, but no discussion. Most I know of it is > what Linus committed to bk last week. > > http://linux.bkbits.net:8080/linux-2.6/cset@4238cb8e36_Z5Cgys8rTovspboIJpw > http://linux.bkbits.net:8080/linux-2.6/cset@4239dad1BWUxd4WEx388lwZCb05Q0Q All covered at the moment by CAN-2005-0815 Mark we can consider this for updates once the dust on iso9660 fixes has settled Should I try to commit those two patches to all of our trees? At least for some 2.4 tree, they do not apply cleanly, so I will need to adapt them and risk some breakage. Ok to take that risk? I wouldn't back port these to 2.4 hubert, we just will not apply those (except an exploit shows up) but get them via mainline in 10.0. CVE-2005-0815: CVSS v2 Base Score: 6.4 (AV:N/AC:L/Au:N/C:N/I:P/A:P) |