Your message dated Mon, 09 May 2005 07:32:18 -0400
with message-id <[EMAIL PROTECTED]>
and subject line Bug#230875: fixed in pam-pgsql 0.5.2-9
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--------------------------------------
Received: (at submit) by bugs.debian.org; 5 May 2005 13:41:05 +0000
>From [EMAIL PROTECTED] Thu May 05 06:41:05 2005
Return-path: <[EMAIL PROTECTED]>
Received: from master.debian.org [146.82.138.7] 
        by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
        id 1DTgbB-0005vL-00; Thu, 05 May 2005 06:41:05 -0700
Received: from bsn-77-143-219.dsl.siol.net [193.77.143.219] 
        by master.debian.org with esmtp (Exim 3.35 1 (Debian))
        id 1DTgb9-0003Rr-00; Thu, 05 May 2005 08:41:04 -0500
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: Primoz Bratanic <[EMAIL PROTECTED]>
To: Debian Bug Tracking System <[EMAIL PROTECTED]>
Subject: pam-pgsql: CAN-2004-0366
X-Mailer: reportbug 3.11
Date: Thu, 05 May 2005 15:41:13 +0200
X-Debbugs-Cc: [EMAIL PROTECTED]
Message-Id: <[EMAIL PROTECTED]>
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-9.0 required=4.0 tests=BAYES_00,HAS_PACKAGE,
        OUR_MTA_MSGID,X_DEBBUGS_CC autolearn=ham 
        version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 

Package: pam-pgsql
Severity: critical
Tags: security
Justification: root security hole

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


The problem reported in BUG#230875 and marked as fixed (NMU upload) was open
again. The changes have disappeared. Please see the patch attached to
Bug#230875 regarding sql injection problem with changing password (easy
impact would be changing uid to 0 ... root compromise).


Primoz Bratanic


- -- System Information:
Debian Release: 3.1
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: i386 (i686)
Kernel: Linux 2.6.10-1-686-smp
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.0 (GNU/Linux)

iD8DBQFCeiJ5HOuqnSwJthERAiigAJ0WclQhayauLF6qUHr05qdvuWpFuACgzrFQ
EILLu3ovr/HW3W08sUij+n8=
=a+R3
-----END PGP SIGNATURE-----

---------------------------------------
Received: (at 230875-close) by bugs.debian.org; 9 May 2005 11:46:56 +0000
>From [EMAIL PROTECTED] Mon May 09 04:46:56 2005
Return-path: <[EMAIL PROTECTED]>
Received: from newraff.debian.org [208.185.25.31] (mail)
        by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
        id 1DV6iu-0004E4-00; Mon, 09 May 2005 04:46:56 -0700
Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian))
        id 1DV6Uk-0004lU-00; Mon, 09 May 2005 07:32:18 -0400
From: Primoz Bratanic <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
X-Katie: $Revision: 1.55 $
Subject: Bug#230875: fixed in pam-pgsql 0.5.2-9
Message-Id: <[EMAIL PROTECTED]>
Sender: Archive Administrator <[EMAIL PROTECTED]>
Date: Mon, 09 May 2005 07:32:18 -0400
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
        autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 
X-CrossAssassin-Score: 11

Source: pam-pgsql
Source-Version: 0.5.2-9

We believe that the bug you reported is fixed in the latest version of
pam-pgsql, which is due to be installed in the Debian FTP archive:

libpam-pgsql_0.5.2-9_i386.deb
  to pool/main/p/pam-pgsql/libpam-pgsql_0.5.2-9_i386.deb
pam-pgsql_0.5.2-9.diff.gz
  to pool/main/p/pam-pgsql/pam-pgsql_0.5.2-9.diff.gz
pam-pgsql_0.5.2-9.dsc
  to pool/main/p/pam-pgsql/pam-pgsql_0.5.2-9.dsc



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Primoz Bratanic <[EMAIL PROTECTED]> (supplier of updated pam-pgsql package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Sun, 8 May 2005 23:10:16 +0200
Source: pam-pgsql
Binary: libpam-pgsql
Architecture: source i386
Version: 0.5.2-9
Distribution: unstable
Urgency: low
Maintainer: Primoz Bratanic <[EMAIL PROTECTED]>
Changed-By: Primoz Bratanic <[EMAIL PROTECTED]>
Description: 
 libpam-pgsql - PAM module to authenticate using a PostgreSQL database
Closes: 130496 139473 142889 204181 204439 218291 230875 236484 240823 247536 
280774 281703 303198 307366 307784
Changes: 
 pam-pgsql (0.5.2-9) unstable; urgency=low
 .
   * Reapplied security patches (Closes: #230875,#307784)
   * Boolean values works with boolean type as well (Closes: #130496)
   * Documentation typo (Closes: #218291)
   * Reapplied other NMU patches (Closes: #307366)
   * Allow port specification (Closes: #247536)
   * Reapplied "Stack-Friendly patch" (Closes: #139473)
   * Deleted wrong README.Debian (Closes: #204181)
   * Documented host and port options (Closes: #204439)
   * Reapplied patch to allow different config files (Closes: #236484)
   * Reapplied patch to support another MD5 type passwords (Closes: #142889)
   * Change "must change password" field (if any) to false after changing 
password
   * Deleted build-all from root (Closes: #240823)
   * Fixed few memory leaks (Closes: #280774)
   * Added timeout option for database connects (Closes: #281703)
   * Use debian/compat instead of DH_COMPAT
   * drop DH_COMPAT and DH_VERBOSE exports from debian/rules
   * don't ask root for password whan changing password
   * New Maintainer (Closes: #303198)
   * Fixed PAM stack to behave exactly as expected with use_authtok
   * Fixed a lot of memory leaks introduced by security patches
   * Fixed a lot of memory leaks arround returning error early
Files: 
 074fc0709067f077f6972e980ed6a464 620 admin extra pam-pgsql_0.5.2-9.dsc
 f667f5b2dc4689d4b5abe58adea10428 71833 admin extra pam-pgsql_0.5.2-9.diff.gz
 41fbf6743108146098868d82abb79b86 15394 admin extra 
libpam-pgsql_0.5.2-9_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.0 (GNU/Linux)

iD8DBQFCf0ZA97LBwbNFvdMRAjxdAJ4mx2lgQnszA30FmjovGtEx460gyQCfYwAB
mymZOzojT/MstkqwUrKX/K8=
=dJ7/
-----END PGP SIGNATURE-----


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to