[11611] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Debian not vulnerable to recent cron buffer overflow

daemon@ATHENA.MIT.EDU (Marc Merlin)
Mon Aug 30 19:13:22 1999

Mime-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Message-Id:  <19990828224303.D15627@merlins.org>
Date:         Sat, 28 Aug 1999 22:43:03 -0700
Reply-To: Marc Merlin <marc_news@MERLINS.ORG>
From: Marc Merlin <marc_news@MERLINS.ORG>
X-To:         security@debian.org, BUGTRAQ@SECURITYFOCUS.COM
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To:  <"lACH2C.A.C2C.UnVx3"@murphy>; from Aleph One on Thu, Aug 26,
              1999 at 09:47:22AM -0700

On Thu, Aug 26, 1999 at 09:47:22AM -0700, Aleph One wrote:
> ----------------------------------------------------------------------------
> Debian Security Advisory                                 security@debian.org
> http://www.debian.org/security/                               Martin Schulze
> August 26, 1999
> ----------------------------------------------------------------------------
>
> Red Hat has recently released a Security Advisory (RHSA-1999:030-01)
> covering a buffer overflow in the vixie cron package.  Debian has
> discovered this bug two years ago and fixed it.  Therefore versions in
> both, the stable and the unstable, distributions of Debian are not
> vulnerable to this problem..

Does anyone know  if Debian never sent the  fix to Paul Vixie, or  if it was
sent and Paul "missed it"?

Even in the second case, unless Paul repeatedly refused the patch, it'd have
been  nice  for the  Debian  maintainer  to make  sure  that  the patch  was
incorporated in the main source code, not just in Debian...

Marc
--
Microsoft is to software what McDonalds is to gourmet cooking

Home page: http://marc.merlins.org/ (friendly to non IE browsers)
Finger marc_f@merlins.org for PGP key and other contact information

home help back first fref pref prev next nref lref last post