Package: reiser4progs
Version: 1.0.8-1
Severity: normal

Dear Maintainer,

A overflow buffer vulnerability is easily exploitable in the --override 
argument in measurefs.reiser4.

POC:

/sbin/measurefs.reiser4 
--overrid=======================================================================================================================================================================================================================================================================================================================================================
 A

In jessie/sid, the stack protection will stop the execution. But in Debian 
Wheezy, it will be easily exploitable. This testcase was made to work in both 
version of Debian since the issue is present in 1.0.7-6.3 and 1.0.8-1.

-- System Information:
Debian Release: jessie/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (x86_64)

ANSI_X3.4-1968)
Shell: /bin/sh linked to /bin/dash

Versions of packages reiser4progs depends on:
ii  libc6     2.17-93
ii  libuuid1  2.20.1-5.5

reiser4progs recommends no packages.

reiser4progs suggests no packages.

-- debconf information excluded


-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to