Home page logo

fulldisclosure logo Full Disclosure mailing list archives

Re: How not to deal with a vulnerability in your code
From: Jeremy Visser <jeremy () visser name>
Date: Sun, 6 Nov 2011 12:49:00 +1100

On 05/11/2011, at 18:24, Leon Kaiser wrote:
The flagrant disregard for his userbase is disgusting! I just uninstalled calibre.
sudo apt-get remove calibre

The comment and "patch" you posted shows you clearly did not read the comments in the bug report.

Ubuntu has already had the bug fixed, because they use a safe udev-based hook. The vulnerability only applies to those 
who have installed Calibre from source. So "apt-get remove calibre" is a pretty naïve comment to make, but you couldn't 
resist the bashing, could you?

The reason why he's reinvented the wheel writing the insecure calibre-mount-helper daemon is because there is no 
platform-agnostic solution for auto-mounting.

Modern Linux distros need a udev hook, older ones need a HAL-based hook, BSD needs HAL, and who knows what everyone 
else needs.

Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]