Your message dated Wed, 09 Nov 2005 14:18:10 -0800
with message-id <[EMAIL PROTECTED]>
and subject line Bug#338312: fixed in osh 1.7-15
has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere. Please contact me immediately.)
Debian bug tracking system administrator
(administrator, Debian Bugs database)
--------------------------------------
Received: (at submit) by bugs.debian.org; 9 Nov 2005 12:42:30 +0000
>From [EMAIL PROTECTED] Wed Nov 09 04:42:30 2005
Return-path: <[EMAIL PROTECTED]>
Received: from 24-182-23-95.dhcp.crcy.nv.charter.com (bokeoa.com)
[24.182.23.95]
by spohr.debian.org with esmtp (Exim 3.36 1 (Debian))
id 1EZpHa-0000aF-00; Wed, 09 Nov 2005 04:42:30 -0800
Received: by bokeoa.com (Postfix, from userid 1000)
id C0976329B0; Wed, 9 Nov 2005 04:42:08 -0800 (PST)
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: Charles Stevenson <[EMAIL PROTECTED]>
To: Debian Bug Tracking System <[EMAIL PROTECTED]>
Subject: osh: Environment Variable Input Validation Bug
X-Mailer: reportbug 3.17
Date: Wed, 09 Nov 2005 04:42:08 -0800
X-Debbugs-Cc: Debian Security Team <[EMAIL PROTECTED]>
Message-Id: <[EMAIL PROTECTED]>
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level:
X-Spam-Status: No, hits=-10.5 required=4.0 tests=BAYES_00,HAS_PACKAGE,
RCVD_IN_SORBS,X_DEBBUGS_CC autolearn=ham
version=2.60-bugs.debian.org_2005_01_02
Package: osh
Version: 1.7-14
Severity: critical
Tags: security
Justification: root security hole
Due to a bug in the environment variable substitution code it is
possible to inject environment variables such as LD_PRELOAD and gain a
root shell.
Fully-functional local root exploit here:
http://pulltheplug.org/users/core/files/x_osh3.sh
Kind Regards,
Charles Stevenson
-- System Information:
Debian Release: testing/unstable
APT prefers testing
APT policy: (500, 'testing')
Architecture: i386 (i686)
Shell: /bin/sh linked to /bin/bash
Kernel: Linux 2.6.14-corezion
Locale: LANG=en_US, LC_CTYPE=en_US (charmap=ISO-8859-1)
Versions of packages osh depends on:
ii libc6 2.3.5-6 GNU C Library: Shared libraries an
ii libncurses5 5.4-9 Shared libraries for terminal hand
ii logrotate 3.7.1-2 Log rotation utility
osh recommends no packages.
-- no debconf information
---------------------------------------
Received: (at 338312-close) by bugs.debian.org; 9 Nov 2005 22:23:29 +0000
>From [EMAIL PROTECTED] Wed Nov 09 14:23:29 2005
Return-path: <[EMAIL PROTECTED]>
Received: from katie by spohr.debian.org with local (Exim 3.36 1 (Debian))
id 1EZyGg-0005PK-00; Wed, 09 Nov 2005 14:18:10 -0800
From: Oohara Yuuma <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
X-Katie: $Revision: 1.56 $
Subject: Bug#338312: fixed in osh 1.7-15
Message-Id: <[EMAIL PROTECTED]>
Sender: Archive Administrator <[EMAIL PROTECTED]>
Date: Wed, 09 Nov 2005 14:18:10 -0800
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02
(1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level:
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER
autolearn=no version=2.60-bugs.debian.org_2005_01_02
Source: osh
Source-Version: 1.7-15
We believe that the bug you reported is fixed in the latest version of
osh, which is due to be installed in the Debian FTP archive:
osh_1.7-15.diff.gz
to pool/main/o/osh/osh_1.7-15.diff.gz
osh_1.7-15.dsc
to pool/main/o/osh/osh_1.7-15.dsc
osh_1.7-15_i386.deb
to pool/main/o/osh/osh_1.7-15_i386.deb
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Oohara Yuuma <[EMAIL PROTECTED]> (supplier of updated osh package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.7
Date: Wed, 9 Nov 2005 23:05:52 +0900
Source: osh
Binary: osh
Architecture: source i386
Version: 1.7-15
Distribution: unstable
Urgency: high
Maintainer: Oohara Yuuma <[EMAIL PROTECTED]>
Changed-By: Oohara Yuuma <[EMAIL PROTECTED]>
Description:
osh - Operator's Shell
Closes: 338312
Changes:
osh (1.7-15) unstable; urgency=high
.
* urgency set to high because this version fixes a bug that causes
unauthorized privilege escalation (thanks to Charles Stevenson
<[EMAIL PROTECTED]> for the bug report)
* main.c: don't overwrite the return value of getenv() (closes: #338312)
Files:
ca036c5484091fa935e20df7b3b64b93 553 shells extra osh_1.7-15.dsc
2ceeb3cfac4dad6c0288365add91cc1e 12713 shells extra osh_1.7-15.diff.gz
05e6a964564264b5678db8c5c6a832ca 27782 shells extra osh_1.7-15_i386.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (GNU/Linux)
iD8DBQFDcgcsQNb0LvRkppURAusCAJ956mjDvnN4kIwBGzpYjDzSI5c+0ACgu7hg
StPD2xuDEJEnaGSZVWS0Uds=
=e15U
-----END PGP SIGNATURE-----
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]