* Florian Weimer <[EMAIL PROTECTED]>: 
> * Martin Schulze:
> 
> > What was the behaviour pre-sarge?
> > What is the behaviour post-sarge (or rather in sarge)?
> 
> Do you mean "before and after the upstream security update"?  The
> terms pre-sarge/post-sarge do not make much sense to me in this
> context, I'm afraid.
> 
> > What do you think is the vulnerability?
> 
> The vulnerability is that the firewall fails to enforce the security
> policy the user has configured.

Yes, that is the problem. You expect that certain kind of traffic is
blocked but in fact it isn't.

> [...]
> Here's a draft, in case you want to upload a fixed package.
> 
> (Note that I have yet to test Lorenzo's new package.)
> 
> --------------------------------------------------------------------------
> Debian Security Advisory DSA ???-1                     [EMAIL PROTECTED]
> http://www.debian.org/security/
> September ???, 2005                     http://www.debian.org/security/faq
> --------------------------------------------------------------------------
> 
> Package        : shorewall
> Vulnerability  : programming error
> Problem-Type   : remote
> Debian-specific: no
> CVE ID         : CAN-2005-????
> Debian Bug     : 318946
> 
> Supernaut noticed that shorewall could generate an iptables
> configuration which is significantly more permissive than the rule set
> given in the shorewall configuration.
> [...]

I think it perfectly explains the issue.

-- lorenzo


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to