[prev in list] [next in list] [prev in thread] [next in thread] 

List:       oss-security
Subject:    Re: [oss-security] CVE request: jhead
From:       Robert Buchholz <rbu () gentoo ! org>
Date:       2008-11-26 23:21:54
Message-ID: 200811270022.08443.rbu () gentoo ! org
[Download RAW message or body]


On Wednesday 22 October 2008, Steven M. Christey wrote:
> ======================================================
> Name: CVE-2008-4640
...
> The DoCommand function in jhead.c in Matthias Wandel jhead 2.84 and
> earlier allows local users to delete arbitrary files via vectors
> involving a modified input filename in which (1) a final "z"
> character is replaced by a "t" character or (2) a final "t" character
> is replaced by a "z" character.
...
> Name: CVE-2008-4641
...
> The DoCommand function in jhead.c in Matthias Wandel jhead 2.84 and
> earlier allows attackers to execute arbitrary commands via shell
> metacharacters in unspecified input.


These two issues have been resolved in the current "jhead-latest.tar.gz" 
distributed on the upstream site. Both Ubuntu and Debian have renamed 
one version of this file to be "2.85" whereas upstream has not yet 
released any 2.85 version. Upstream stated that they will release a 
2.85 not before next year, so anyone who has this issue open can either 
extract patches, package the snapshot or wait.


Robert

["signature.asc" (application/pgp-signature)]

[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic