[Mono-bugs] [Bug 647493] New: CVE-2007-5197 not actually fixed, BigInteger unsafe code overflow remains in all versions incl git master
bugzilla_noreply at novell.com
bugzilla_noreply at novell.com
Mon Oct 18 15:13:14 EDT 2010
https://bugzilla.novell.com/show_bug.cgi?id=647493
https://bugzilla.novell.com/show_bug.cgi?id=647493#c0
Summary: CVE-2007-5197 not actually fixed, BigInteger unsafe
code overflow remains in all versions incl git master
Classification: Mono
Product: Mono: Class Libraries
Version: SVN
Platform: x86-64
OS/Version: Ubuntu
Status: NEW
Severity: Normal
Priority: P5 - None
Component: Mono.Security
AssignedTo: spouliot at novell.com
ReportedBy: directhex at apebox.org
QAContact: mono-bugs at lists.ximian.com
Found By: ---
Blocker: ---
User-Agent: Mozilla/5.0 (X11; U; Linux x86_64; en-US) AppleWebKit/534.3
(KHTML, like Gecko) Ubuntu/10.10 Chromium/6.0.472.63 Chrome/6.0.472.63
Safari/534.3
At some point in the past, some wires were crossed.
As a result,
http://www.mono-project.com/Vulnerabilities#BigInteger_unsafe_code_overflow
reports that CVE-2007-5197 was fixed in Mono 1.2.5.1 - it was actually FOUND in
1.2.5.1, and has never been fixed upstream. Pretty much every distro out there
has simply been patching it downstream since 2007.
It should probably get fixed.
Reproducible: Always
Steps to Reproduce:
1. Use upstream Mono
2. Be insecure
Fix is in
http://git.debian.org/?p=pkg-mono/packages/mono.git;a=commitdiff;h=252840544847bf18c954ec3e07590dbad375a392
or any number of other downstream distro patch databases
--
Configure bugmail: https://bugzilla.novell.com/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the QA contact for the bug.
More information about the mono-bugs
mailing list