I don't have anything available to test this on right now, but I strongly suspect that this will not affect the version of Sage currently in Debian. The version currently in Debian is 1.3.7, plus my somewhat draconian patch to fix the previously reported vulnerabilities. See the bug report for the last round of vulnerabilities for the patch I hacked up [0].

Reasoning:
From the looks of the feed mentioned in the report [1] the exploit can only work if HTML mode is on. If HTML mode is disabled the contents of the feed will be converted into HTML entities as required before viewing, which will prevent the exploit from working. My patch disabled HTML mode entirely (as well as fixing a bug with the non- HTML mode), therefore I can't see this exploit working on the version in Debian currently.

As for where to go from here with Debian I'm not quite sure. I had planned to do a fairly comprehensive review of 1.3.8 before uploading it and re-enabling HTML mode. (I still really don't like the way feeds end up treated as local). Presumably though if I'm correct and this bug doesn't actually affect the version in Debian it shouldn't be an RC bug? In light of these problems though I'm somewhat uneasy with the idea of this releasing when Etch releases though. The way to do that though I assume would be to get it removed from testing manually, and keep this bug report open to stop it going back into testing? Any thoughts?

Alan

[0] - http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=388149
[1] - http://michaeldaw.org/projects/sage-exploit-feed.xml


--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to