Bug#806036: Privilege escalation and code execution vulnerabilities in generated NSIS installers

2015-12-15 Thread Didier 'OdyX' Raboud
Dear Security Team, Dear Debian-Boot, Andre has reported this bug on Nov 24, and I've now uploaded the new NSIS version to unstable that fixes this bug. In Debian, there's at least one NSIS installer shipped in packages: win32-loader, that is shipped on our CDs and from the mirrors. Would it b

Bug#806036: Privilege escalation and code execution vulnerabilities in generated NSIS installers

2015-12-02 Thread Andre Heinecke
Hi, On Tuesday 01 December 2015 19:44:36 you wrote: > I would propose to wait for the review and the fix going in upstream. > Thereafter the fix could be back ported to the NSIS version distributed > by Debian. I agree. NSIS upstream reacted quickly and while it is of no concern to us (at gpg4wi

Bug#806036: Privilege escalation and code execution vulnerabilities in generated NSIS installers

2015-12-01 Thread Thomas Gaugler
Thank you very much for your detailed bug report. I would propose to wait for the review and the fix going in upstream. Thereafter the fix could be back ported to the NSIS version distributed by Debian. Best regards, Thomas

Bug#806036: Privilege escalation and code execution vulnerabilities in generated NSIS installers

2015-11-24 Thread Andre Heinecke
Package: nsis Version: 2.46-10 Installers generated by NSIS 2.46 are vulnerable to attacks that can lead to code execution and privilege escalation (if the installer is running with elevated privileges). This has been reported to us at Gpg4win (www.gpg4win.org) which is built under Debian GNU/