Your message dated Fri, 04 Jan 2008 07:52:33 +0000
with message-id <[EMAIL PROTECTED]>
and subject line Bug#454167: fixed in sing 1.1-9sarge1
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--- Begin Message ---
Package: sing
Version: 1.1-15
Severity: critical
Tags: security

Hi,
Please have a look at:
http://www.securityfocus.com/archive/1/484472

This is really a critical thing if sing was installed with 
suid 0 it allows every user on the system to get root access 
and/or to overwrite arbitrary files.
Please fix.

A CVE id for this issue is pending, I'll add it to this bug 
report if I got it.

Kind regards
Nico

-- 
Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.

Attachment: pgpk2Mdw4PWN5.pgp
Description: PGP signature


--- End Message ---
--- Begin Message ---
Source: sing
Source-Version: 1.1-9sarge1

We believe that the bug you reported is fixed in the latest version of
sing, which is due to be installed in the Debian FTP archive:

sing_1.1-9sarge1.diff.gz
  to pool/main/s/sing/sing_1.1-9sarge1.diff.gz
sing_1.1-9sarge1.dsc
  to pool/main/s/sing/sing_1.1-9sarge1.dsc
sing_1.1-9sarge1_i386.deb
  to pool/main/s/sing/sing_1.1-9sarge1_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Alberto Gonzalez Iniesta <[EMAIL PROTECTED]> (supplier of updated sing package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Tue, 01 Jan 2008 16:02:39 +0100
Source: sing
Binary: sing
Architecture: source i386
Version: 1.1-9sarge1
Distribution: oldstable
Urgency: low
Maintainer: Alberto Gonzalez Iniesta <[EMAIL PROTECTED]>
Changed-By: Alberto Gonzalez Iniesta <[EMAIL PROTECTED]>
Description: 
 sing       - A fully programmable ping replacement
Closes: 454167
Changes: 
 sing (1.1-9sarge1) oldstable; urgency=low
 .
   * Patched parser.c to drop privileges when opening log file and
     running sing SUID. (CVE-2007-6211)
     Thanks a lot to Nico Golde for the patch. (Closes: #454167)
Files: 
 ae8db57df9b105e2991403740ee5346c 595 net optional sing_1.1-9sarge1.dsc
 f9f649c4b40174a983601d46e4a3daac 446221 net optional sing_1.1.orig.tar.gz
 28b81fd0dca2c50a6b82b7b8af7be412 34787 net optional sing_1.1-9sarge1.diff.gz
 d4906d21acb434117e69e858cdb9d409 45392 net optional sing_1.1-9sarge1_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFHembfxRSvjkukAcMRAtVoAKCNRaldmfx3DNYEAltxArN+2M+93gCg7mhV
5sQ4ORDj6cZVe7Hw9ZUM31E=
=EaSv
-----END PGP SIGNATURE-----



--- End Message ---

Reply via email to