Your message dated Fri, 04 Jan 2008 07:52:17 +0000
with message-id <[EMAIL PROTECTED]>
and subject line Bug#454167: fixed in sing 1.1-13etch1
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--- Begin Message ---
Package: sing
Version: 1.1-15
Severity: critical
Tags: security

Hi,
Please have a look at:
http://www.securityfocus.com/archive/1/484472

This is really a critical thing if sing was installed with 
suid 0 it allows every user on the system to get root access 
and/or to overwrite arbitrary files.
Please fix.

A CVE id for this issue is pending, I'll add it to this bug 
report if I got it.

Kind regards
Nico

-- 
Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
For security reasons, all text in this mail is double-rot13 encrypted.

Attachment: pgpk1Zb2oPAwl.pgp
Description: PGP signature


--- End Message ---
--- Begin Message ---
Source: sing
Source-Version: 1.1-13etch1

We believe that the bug you reported is fixed in the latest version of
sing, which is due to be installed in the Debian FTP archive:

sing_1.1-13etch1.diff.gz
  to pool/main/s/sing/sing_1.1-13etch1.diff.gz
sing_1.1-13etch1.dsc
  to pool/main/s/sing/sing_1.1-13etch1.dsc
sing_1.1-13etch1_i386.deb
  to pool/main/s/sing/sing_1.1-13etch1_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Alberto Gonzalez Iniesta <[EMAIL PROTECTED]> (supplier of updated sing package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Tue, 01 Jan 2008 15:45:10 +0100
Source: sing
Binary: sing
Architecture: source i386
Version: 1.1-13etch1
Distribution: stable
Urgency: low
Maintainer: Alberto Gonzalez Iniesta <[EMAIL PROTECTED]>
Changed-By: Alberto Gonzalez Iniesta <[EMAIL PROTECTED]>
Description: 
 sing       - A fully programmable ping replacement
Closes: 454167
Changes: 
 sing (1.1-13etch1) stable; urgency=low
 .
   * Patched parser.c to drop privileges when opening log file and
     running sing SUID. (CVE-2007-6211)
     Thanks a lot to Nico Golde for the patch. (Closes: #454167)
Files: 
 87d5f690162eea6c9117563c634ca14c 597 net optional sing_1.1-13etch1.dsc
 f9f649c4b40174a983601d46e4a3daac 446221 net optional sing_1.1.orig.tar.gz
 ae9156235aea0600fb200d44feb8d984 38590 net optional sing_1.1-13etch1.diff.gz
 4b930ba44f119cc809ac139c2eed2dc0 47498 net optional sing_1.1-13etch1_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFHema5xRSvjkukAcMRAl/6AJ0SRw3Vd0dD3Se68aGUZY5H4tlJBQCghhVE
8V0YjiqxM5hRMZQ0Cen61tc=
=98HG
-----END PGP SIGNATURE-----



--- End Message ---

Reply via email to