Your message dated Wed, 9 Mar 2016 09:45:04 +0100
with message-id <20160309084504.GA8996@feivel>
and subject line Not vulnerable
has caused the Debian Bug report #798067,
regarding bsdmainutils: CVE-2015-5218
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
798067: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=798067
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Source: bsdmainutils
Version: 8.0.13
Severity: normal
Tags: security upstream

Hi,

the following vulnerability was published for bsdmainutils.

CVE-2015-5218[0]:
buffer overflow in colcrt

If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2015-5218
[1] https://bugzilla.redhat.com/show_bug.cgi?id=1259322

The impact is not clear.

Regards,
Salvatore

--- End Message ---
--- Begin Message ---
It appears this CVE is against colcrt from util-linux, not the one dereived
from bsd which we use. Ours does not seem to be vulnerable at all:

michael@feivel:~$ colcrt Downloads/binZ8dhbQ3bFM.bin 
colcrt: Invalid or incomplete multibyte or wide character

The file used is the one from the original bug report.

Hence, I just close the bug report. Please re-open if I missed anything.

Michael
-- 
Michael Meskes
Michael at Fam-Meskes dot De, Michael at Meskes dot (De|Com|Net|Org)
Meskes at (Debian|Postgresql) dot Org
Jabber: michael at xmpp dot meskes dot org
VfL Borussia! Força Barça! Go SF 49ers! Use Debian GNU/Linux, PostgreSQL

--- End Message ---

Reply via email to