Steve Langasek wrote: > On Wed, Apr 05, 2006 at 11:00:16AM +0200, Moritz Muehlenhoff wrote: > > Steve Langasek wrote: > > > > > This bug has been pending for more than two months and no fix in > > > > > Debian > > > > > yet... Does Bruno still track his bugs? > > > > > > Here is two patches for both Sarge and Sid versions. > > > > > > Pierre Riteau > > > > > > (CC'ing [EMAIL PROTECTED] for the stable fix, and the > > > > > Co-Maintainer as I don't know if he receives BTS replies) > > > > > (Email address in previous message for tagging is wrong, I was playing > > > > > with bts thinking it wouldn't commit the changes) > > > > > Xmame is non-free and thus not supported by the Security Team. > > > > (Only the relatively obscure -svgalib version is affected, anyway.) > > > > Is it the case that this bug doesn't affect the other frontends *at all*, > > > or > > > just that, not being suid root, it's just an arbitrary code execution bug > > > instead of a root exploit? > > > It's a local vulnerability, the only security ramification would be a > > privilege escalation: > > If untrusted input can trigger arbitrary code execution, then that still has > security implications. I don't think that most users only use trusted ROMs > with xmame. :)
Yeah, but according to the original advisory the overflows are in args parsing. (It could be possible that these values can somehow be influenced from a crafted ROM, though.) Cheers, Moritz -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]