Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 534382 - <app-forensics/sleuthkit-4.0.2: Improper handling of FAT file system entries (CVE-2012-5619)
Summary: <app-forensics/sleuthkit-4.0.2: Improper handling of FAT file system entries ...
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal minor (vote)
Assignee: Gentoo Security
URL:
Whiteboard: B4 [noglsa]
Keywords:
Depends on:
Blocks:
 
Reported: 2015-01-02 22:41 UTC by GLSAMaker/CVETool Bot
Modified: 2015-12-31 06:08 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description GLSAMaker/CVETool Bot gentoo-dev 2015-01-02 22:41:15 UTC
CVE-2012-5619 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5619):
  The Sleuth Kit (TSK) 4.0.1 does not properly handle "." (dotfile) file
  system entries in FAT file systems and other file systems for which . is not
  a reserved name, which allows local users to hide activities it more
  difficult to conduct forensics activities, as demonstrated by Flame.


Maintainers, please drop the vulnerable version (4.0.1). Thanks
Comment 1 Manuel Rüger (RETIRED) gentoo-dev 2015-08-28 00:14:57 UTC
Vulnerable removed.

Security: Please vote.
Comment 2 Stefan Behte (RETIRED) gentoo-dev Security 2015-11-09 22:05:32 UTC
Vote: NO.
Comment 3 Yury German Gentoo Infrastructure gentoo-dev 2015-12-31 04:46:19 UTC
GLSA Vote: No
Thank you all. Closing as noglsa.