Luk Claes <l...@debian.org> writes:

> Package: gridengine
> Version: 6.2u5-7
> Severity: normal
> Tags: patch pending
>
> Dear maintainer,
>
> I've prepared an NMU for gridengine (versioned as 6.2u5-7.1) and
> uploaded it to DELAYED/02. Please feel free to tell me if I
> should delay it longer.

??  The CVE is already addressed
<http://packages.debian.org/changelogs/pool/main/g/gridengine/gridengine_6.2u5-1squeeze1/changelog>
and it's ironic to propose an inferior fix that looks as if it came from
OGS, given their reaction to reporting issues that you find and fix,
specifically to Debian security.

The patch I supplied took sensitive environment variables from Debian's
libc and sudo, which I take to be canonical though I'd value comments
from security people.  (Things like PYTHONPATH are irrelevant because
you can/should use "python -E" in methods, and then where do you stop --
why not Ruby?  Also, it's now clear that the issue of the user
environment needs addressing more fundamentally.)

Debian doesn't distribute sgepasswd, so I ignored it, but there are more
issues with it
<https://arc.liv.ac.uk/trac/SGE/log/sge/source/utilbin/sge_passwd.c>.

However, this is probably irrelevant with the current packaging, which I
didn't realize initially.  The Debian-supplied configuration allows
equivalent privilege elevation anyway, and the package doesn't have the
script to change it (#598510).

-- 
Community Grid Engine:  http://arc.liv.ac.uk/SGE/



-- 
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org

Reply via email to