Your message dated Tue, 14 Mar 2006 18:13:38 +0100 with message-id <1142356419.4973.22.camel@darwin.os9.nl> and subject line Fixed in xpvm has caused the attached Bug report to be marked as done. This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database)
--- Begin Message ---
- To: Debian Bug Tracking System <submit@bugs.debian.org>
- Subject: CAN-2005-2240 symlink attack in xpvm.tcl
- From: Joey Hess <joeyh@debian.org>
- Date: Thu, 14 Jul 2005 17:27:33 +0300
- Message-id: <20050714142733.GA26234@kitenet.net>
Package: xpvm Severity: serious Tags: security According to http://secunia.com/advisories/16040: Eric Romang has reported a vulnerability in xpvm, which can be exploited by malicious, local users to perform certain actions on a vulnerable system with escalated privileges. The vulnerability is caused due to the temporary file "/tmp/xpvm.trace.$user" being created insecurely by "src/xpvm.tcl". This can be exploited via symlink attacks to create or overwrite arbitrary files with the privileges of the user running the affected application. This is CAN-2005-2240. -- see shy joAttachment: signature.asc
Description: Digital signature
--- End Message ---
--- Begin Message ---
- To: 318285-done@bugs.debian.org
- Subject: Fixed in xpvm
- From: Thijs Kinkhorst <kink@squirrelmail.org>
- Date: Tue, 14 Mar 2006 18:13:38 +0100
- Message-id: <1142356419.4973.22.camel@darwin.os9.nl>
Version: 1.2.5-8 This bug has been fixed in the upload of 2005-09-04 by Matej Vela, but was inadvertently reopened for sid. Closing the bug again with the right version. Thijs
--- End Message ---