[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#318285: marked as done (CAN-2005-2240 symlink attack in xpvm.tcl)

Your message dated Tue, 14 Mar 2006 18:13:38 +0100
with message-id <1142356419.4973.22.camel@darwin.os9.nl>
and subject line Fixed in xpvm
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--- Begin Message ---
Package: xpvm
Severity: serious
Tags: security

According to http://secunia.com/advisories/16040:

  Eric Romang has reported a vulnerability in xpvm, which can be exploited by
  malicious, local users to perform certain actions on a vulnerable system with
  escalated privileges.

  The vulnerability is caused due to the temporary file "/tmp/xpvm.trace.$user"
  being created insecurely by "src/xpvm.tcl". This can be exploited via symlink
  attacks to create or overwrite arbitrary files with the privileges of the user
  running the affected application.

This is CAN-2005-2240.

see shy jo

Attachment: signature.asc
Description: Digital signature

--- End Message ---
--- Begin Message ---
Version: 1.2.5-8

This bug has been fixed in the upload of 2005-09-04 by Matej Vela, but
was inadvertently reopened for sid. Closing the bug again with the right


--- End Message ---

Reply to: