Your message dated Sun, 04 Sep 2005 06:17:09 -0700
with message-id <[EMAIL PROTECTED]>
and subject line Bug#318285: fixed in xpvm 1.2.5-8
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--------------------------------------
Received: (at submit) by bugs.debian.org; 14 Jul 2005 14:26:51 +0000
>From [EMAIL PROTECTED] Thu Jul 14 07:26:51 2005
Return-path: <[EMAIL PROTECTED]>
Received: from kitenet.net [64.62.161.42] (postfix)
        by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
        id 1Dt4fq-0003MT-00; Thu, 14 Jul 2005 07:26:51 -0700
Received: from dragon.kitenet.net (kitenet.net [127.0.0.1])
        (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits))
        (Client CN "Joey Hess", Issuer "Joey Hess" (verified OK))
        by kitenet.net (Postfix) with ESMTP id 75F4217DD1
        for <[EMAIL PROTECTED]>; Thu, 14 Jul 2005 14:26:50 +0000 (GMT)
Received: by dragon.kitenet.net (Postfix, from userid 1000)
        id 38F306E134; Thu, 14 Jul 2005 17:27:33 +0300 (EEST)
Date: Thu, 14 Jul 2005 17:27:33 +0300
From: Joey Hess <[EMAIL PROTECTED]>
To: Debian Bug Tracking System <[EMAIL PROTECTED]>
Subject: CAN-2005-2240 symlink attack in xpvm.tcl
Message-ID: <[EMAIL PROTECTED]>
Mime-Version: 1.0
Content-Type: multipart/signed; micalg=pgp-sha1;
        protocol="application/pgp-signature"; boundary="0F1p//8PRICkK4MW"
Content-Disposition: inline
X-Reportbug-Version: 3.15
User-Agent: Mutt/1.5.9i
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
        autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 


--0F1p//8PRICkK4MW
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable

Package: xpvm
Severity: serious
Tags: security

According to http://secunia.com/advisories/16040:

  Eric Romang has reported a vulnerability in xpvm, which can be exploited =
by
  malicious, local users to perform certain actions on a vulnerable system =
with
  escalated privileges.

  The vulnerability is caused due to the temporary file "/tmp/xpvm.trace.$u=
ser"
  being created insecurely by "src/xpvm.tcl". This can be exploited via sym=
link
  attacks to create or overwrite arbitrary files with the privileges of the=
 user
  running the affected application.

This is CAN-2005-2240.

--=20
see shy jo

--0F1p//8PRICkK4MW
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: Digital signature
Content-Disposition: inline

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (GNU/Linux)

iD8DBQFC1nZVd8HHehbQuO8RAhk+AKC0cRmtdAkkp8x10Nt4zqTi1M49sQCgiP57
cxquqi0Uu12YUEbwq02YKwo=
=EjuF
-----END PGP SIGNATURE-----

--0F1p//8PRICkK4MW--

---------------------------------------
Received: (at 318285-close) by bugs.debian.org; 4 Sep 2005 13:18:50 +0000
>From [EMAIL PROTECTED] Sun Sep 04 06:18:50 2005
Return-path: <[EMAIL PROTECTED]>
Received: from katie by spohr.debian.org with local (Exim 3.36 1 (Debian))
        id 1EBuMv-0007rF-00; Sun, 04 Sep 2005 06:17:09 -0700
From: Matej Vela <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
X-Katie: $Revision: 1.56 $
Subject: Bug#318285: fixed in xpvm 1.2.5-8
Message-Id: <[EMAIL PROTECTED]>
Sender: Archive Administrator <[EMAIL PROTECTED]>
Date: Sun, 04 Sep 2005 06:17:09 -0700
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
        autolearn=no version=2.60-bugs.debian.org_2005_01_02

Source: xpvm
Source-Version: 1.2.5-8

We believe that the bug you reported is fixed in the latest version of
xpvm, which is due to be installed in the Debian FTP archive:

xpvm_1.2.5-8.diff.gz
  to pool/main/x/xpvm/xpvm_1.2.5-8.diff.gz
xpvm_1.2.5-8.dsc
  to pool/main/x/xpvm/xpvm_1.2.5-8.dsc
xpvm_1.2.5-8_i386.deb
  to pool/main/x/xpvm/xpvm_1.2.5-8_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Matej Vela <[EMAIL PROTECTED]> (supplier of updated xpvm package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Sun,  4 Sep 2005 14:44:07 +0200
Source: xpvm
Binary: xpvm
Architecture: source i386
Version: 1.2.5-8
Distribution: unstable
Urgency: high
Maintainer: Debian QA Group <[EMAIL PROTECTED]>
Changed-By: Matej Vela <[EMAIL PROTECTED]>
Description: 
 xpvm       - graphical console and monitor for PVM
Closes: 318285
Changes: 
 xpvm (1.2.5-8) unstable; urgency=high
 .
   * QA upload.
   * Use ~/.xpvm_trace instead of /tmp/xpvm.trace.$USER to prevent symlink
     attacks.  (Trace files are meant to be semi-persistent, so this is more
     in line with user expectations than creating unique temporary files.)
     [src/xpvm.tcl, src/help/traces.help, debian/xpvm.1, CAN-2005-2240]
     Closes: #318285.
Files: 
 302430bf43733f943f9b64d8bd6e3ef0 565 devel extra xpvm_1.2.5-8.dsc
 4830ca9affcea2cbc192acaeed63e5cf 6808 devel extra xpvm_1.2.5-8.diff.gz
 495af96ea96f348b9f0264f5e38de908 169334 devel extra xpvm_1.2.5-8_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (GNU/Linux)

iD8DBQFDGuw2xBYivKllgY8RAl+aAJ9fXjR+01irGCT5T994OQETuGNb5QCghRcF
nryezpCnlLWHgZu78m/mh7c=
=R8A3
-----END PGP SIGNATURE-----


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to