Your message dated Sat, 21 May 2005 15:47:15 -0400
with message-id <[EMAIL PROTECTED]>
and subject line Bug#309648: fixed in cheetah 0.9.16-1
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--------------------------------------
Received: (at submit) by bugs.debian.org; 18 May 2005 14:28:39 +0000
>From [EMAIL PROTECTED] Wed May 18 07:28:39 2005
Return-path: <[EMAIL PROTECTED]>
Received: from inutil.org (vserver151.vserver151.serverflex.de) 
[193.22.164.111] 
        by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
        id 1DYPXL-0002YB-00; Wed, 18 May 2005 07:28:39 -0700
Received: from jmm by vserver151.vserver151.serverflex.de with local (Exim 4.50)
        id 1DYPVm-000324-SL
        for [EMAIL PROTECTED]; Wed, 18 May 2005 16:27:02 +0200
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: Moritz Muehlenhoff <[EMAIL PROTECTED]>
To: Debian Bug Tracking System <[EMAIL PROTECTED]>
Subject: Cheetah loads arbitrary code from /tmp
X-Mailer: reportbug 3.8
Date: Wed, 18 May 2005 16:27:02 +0200
Message-Id: <[EMAIL PROTECTED]>
X-SA-Exim-Connect-IP: <locally generated>
X-SA-Exim-Mail-From: [EMAIL PROTECTED]
X-SA-Exim-Scanned: No (on vserver151.vserver151.serverflex.de); SAEximRunCond 
expanded to false
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE 
        autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 

Package: cheetah
Severity: grave
Tags: security

Cheetah loads arbitrary module code from /tmp, see
http://sourceforge.net/mailarchive/forum.php?thread_id=7070332&forum_id=1542
for a detailed discussion. It's fixed in CVS and 0.9.17rc1,
but since Sarge is in freeze an upload with only the security
fix would surely be appreciated by the release managers.

Cheers,
         Moritz

-- System Information:
Debian Release: 3.1
  APT prefers testing
  APT policy: (990, 'testing')
Architecture: i386 (i686)
Kernel: Linux 2.4.29-vs1.2.10
Locale: LANG=C, LC_CTYPE=C (charmap=ANSI_X3.4-1968)

---------------------------------------
Received: (at 309648-close) by bugs.debian.org; 21 May 2005 19:51:06 +0000
>From [EMAIL PROTECTED] Sat May 21 12:51:06 2005
Return-path: <[EMAIL PROTECTED]>
Received: from newraff.debian.org [208.185.25.31] (mail)
        by spohr.debian.org with esmtp (Exim 3.35 1 (Debian))
        id 1DZa02-0008HS-00; Sat, 21 May 2005 12:51:06 -0700
Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian))
        id 1DZZwJ-0000ca-00; Sat, 21 May 2005 15:47:15 -0400
From: Chad Walstrom <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
X-Katie: $Revision: 1.55 $
Subject: Bug#309648: fixed in cheetah 0.9.16-1
Message-Id: <[EMAIL PROTECTED]>
Sender: Archive Administrator <[EMAIL PROTECTED]>
Date: Sat, 21 May 2005 15:47:15 -0400
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
        autolearn=no version=2.60-bugs.debian.org_2005_01_02
X-Spam-Level: 

Source: cheetah
Source-Version: 0.9.16-1

We believe that the bug you reported is fixed in the latest version of
cheetah, which is due to be installed in the Debian FTP archive:

cheetah-common_0.9.16-1_all.deb
  to pool/main/c/cheetah/cheetah-common_0.9.16-1_all.deb
cheetah_0.9.16-1.diff.gz
  to pool/main/c/cheetah/cheetah_0.9.16-1.diff.gz
cheetah_0.9.16-1.dsc
  to pool/main/c/cheetah/cheetah_0.9.16-1.dsc
python-cheetah_0.9.16-1_all.deb
  to pool/main/c/cheetah/python-cheetah_0.9.16-1_all.deb
python2.2-cheetah_0.9.16-1_i386.deb
  to pool/main/c/cheetah/python2.2-cheetah_0.9.16-1_i386.deb
python2.3-cheetah_0.9.16-1_i386.deb
  to pool/main/c/cheetah/python2.3-cheetah_0.9.16-1_i386.deb
python2.4-cheetah_0.9.16-1_i386.deb
  to pool/main/c/cheetah/python2.4-cheetah_0.9.16-1_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Chad Walstrom <[EMAIL PROTECTED]> (supplier of updated cheetah package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Sat, 21 May 2005 12:40:10 -0500
Source: cheetah
Binary: python2.3-cheetah cheetah-common python2.2-cheetah python-cheetah 
python2.4-cheetah
Architecture: source i386 all
Version: 0.9.16-1
Distribution: unstable
Urgency: high
Maintainer: Chad Walstrom <[EMAIL PROTECTED]>
Changed-By: Chad Walstrom <[EMAIL PROTECTED]>
Description: 
 cheetah-common - text-based template engine and Python code generator
 python-cheetah - text-based template engine and Python code generator
 python2.2-cheetah - text-based template engine and Python code generator
 python2.3-cheetah - text-based template engine and Python code generator
 python2.4-cheetah - text-based template engine and Python code generator
Closes: 309648
Changes: 
 cheetah (0.9.16-1) unstable; urgency=high
 .
   * debian/rules, debian/patches: Added simple-patchsys so we can
     apply security patches.
   * debian/patches/309648-tmpfix.patch: Kenshi Muto grabbed this one
     from the cheetahtemplate CVS.  Upstream rewrote how imports were
     handled, removing the need to use temp files and eliminating this
     security breech.  Closes: #309648
   * debian/control: Added version dependency for cdbs, required to support
     Python 2.4.
Files: 
 89b3f3a298f00614529fccfc7c5fe96d 722 text optional cheetah_0.9.16-1.dsc
 26427c4087e052c627ce226591d6e030 143466 text optional 
cheetah_0.9.16.orig.tar.gz
 4d482a1c228724564e06ae7747544232 9715 text optional cheetah_0.9.16-1.diff.gz
 b86d48c8b05d70a262c28d3f2983d64d 28690 text optional 
cheetah-common_0.9.16-1_all.deb
 fa1cc35d62c30b462ff1c41b70a32132 25356 text optional 
python-cheetah_0.9.16-1_all.deb
 5bbcd5f68d5c242433c5adb83e5aeca4 148280 text optional 
python2.2-cheetah_0.9.16-1_i386.deb
 6f01951dae27911411a58c731548b65a 148282 text optional 
python2.3-cheetah_0.9.16-1_i386.deb
 ac40b445899c88105478a39bd50b4ba8 148290 text optional 
python2.4-cheetah_0.9.16-1_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.5 (GNU/Linux)

iD8DBQFCj4MYDMcLGCBsWv0RAvgYAJ9Ab162yfmglsAklJ6CVs3oA5+gJACgy3Kc
rOzDuZHwVIC3FPdliumOh70=
=OIB9
-----END PGP SIGNATURE-----


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to