Your message dated Fri, 05 Mar 2010 19:52:51 +0000
with message-id <e1nndzr-00008v...@ries.debian.org>
and subject line Bug#547011: fixed in open-iscsi 2.0.870~rc3-0.4.1
has caused the Debian Bug report #547011,
regarding Insecure temporary file name in iscsi_discovery
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
547011: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=547011
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: open-iscsi
Severity: important
Tags: security

The following report was send to us by Kees Cook, this is CVE-2009-1297.

There are currently more important issues scheduled for DSAs, please fix
this one by preparing an update for the next stable point update. Etch
is not affected.

Cheers,
        Moritz

Colin Watson reported the following bug:
https://launchpad/bugs/408915

  The iscsi_discovery shell script, typically run as root, contains the
  following code:

        df=/tmp/discovered.$$

        dbg "starting discovery to $ip"
        iscsiadm -m discovery --type sendtargets --portal ${ip}:${port} > ${df}

  This is a standard security vulnerability and should be replaced by use of
  mktemp or shell variables.

The proposed patch is attached.

diff -u open-iscsi-2.0.870.1/utils/iscsi_discovery 
open-iscsi-2.0.870.1/utils/iscsi_discovery
--- open-iscsi-2.0.870.1/utils/iscsi_discovery
+++ open-iscsi-2.0.870.1/utils/iscsi_discovery
@@ -128,24 +128,22 @@

        connected=0
        discovered=0
-       df=/tmp/discovered.$$

        dbg "starting discovery to $ip"
-       iscsiadm -m discovery --type sendtargets --portal ${ip}:${port} > ${df}
-       while read portal target
+       disc="$(iscsiadm -m discovery --type sendtargets --portal 
${ip}:${port})"
+       echo "${disc}" | while read portal target
        do
                portal=${portal%,*}
                select_transport
-       done < ${df}
+       done

-       discovered=$(cat ${df} | wc -l)
+       discovered=$(echo "${disc}" | wc -l)
        if [ ${discovered} = 0 ]; then
                echo "failed to discover targets at ${ip}"
                exit 2
        else
                echo "discovered ${discovered} targets at ${ip}"
        fi
-       /bin/rm -f ${df}
 }

 try_login()


-- System Information:
Debian Release: squeeze/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: i386 (i686)

Kernel: Linux 2.6.30-1-686 (SMP w/1 CPU core)
Locale: LANG=C, lc_ctype=de_de.iso-8859...@euro (charmap=ISO-8859-15)
Shell: /bin/sh linked to /bin/bash

Versions of packages open-iscsi depends on:
ii  libc6                         2.9-26     GNU C Library: Shared libraries

open-iscsi recommends no packages.

open-iscsi suggests no packages.



--- End Message ---
--- Begin Message ---
Source: open-iscsi
Source-Version: 2.0.870~rc3-0.4.1

We believe that the bug you reported is fixed in the latest version of
open-iscsi, which is due to be installed in the Debian FTP archive:

open-iscsi_2.0.870~rc3-0.4.1.diff.gz
  to main/o/open-iscsi/open-iscsi_2.0.870~rc3-0.4.1.diff.gz
open-iscsi_2.0.870~rc3-0.4.1.dsc
  to main/o/open-iscsi/open-iscsi_2.0.870~rc3-0.4.1.dsc
open-iscsi_2.0.870~rc3-0.4.1_amd64.deb
  to main/o/open-iscsi/open-iscsi_2.0.870~rc3-0.4.1_amd64.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 547...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Ritesh Raj Sarraf <r...@researchut.com> (supplier of updated open-iscsi package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Thu, 04 Mar 2010 14:20:24 +0530
Source: open-iscsi
Binary: open-iscsi
Architecture: source amd64
Version: 2.0.870~rc3-0.4.1
Distribution: stable
Urgency: low
Maintainer: Philipp Hug <deb...@hug.cx>
Changed-By: Ritesh Raj Sarraf <r...@researchut.com>
Description: 
 open-iscsi - High performance, transport independent iSCSI implementation
Closes: 547011
Changes: 
 open-iscsi (2.0.870~rc3-0.4.1) stable; urgency=low
 .
   * Fix CVE-2009-1297 (Closes: #547011) - thanks to Colin Watson for
     the patch
Checksums-Sha1: 
 4d8d74235dc6ac11740fbccf1591e001e9c2c942 1771 open-iscsi_2.0.870~rc3-0.4.1.dsc
 5e746bf8e45c334ca7f6d3377843a3c539211821 9547 
open-iscsi_2.0.870~rc3-0.4.1.diff.gz
 82db06f93ac59237010a0e08832cd7d3a4e1dc42 599844 
open-iscsi_2.0.870~rc3-0.4.1_amd64.deb
Checksums-Sha256: 
 e77bc6e1d0f226cf4968c799779f2f139eea2637c09cda1c68a357694f910f3f 1771 
open-iscsi_2.0.870~rc3-0.4.1.dsc
 ffef33589ce5c4d1c6bbfd738583afc704e151efd2fe6d491445a2edbf754f09 9547 
open-iscsi_2.0.870~rc3-0.4.1.diff.gz
 c1008850038c9dfbc3c1fbdd2a64514d3241a7bdfefea3276ea40501d4cab790 599844 
open-iscsi_2.0.870~rc3-0.4.1_amd64.deb
Files: 
 71875da184e07dc6aed20387f468dcd5 1771 net optional 
open-iscsi_2.0.870~rc3-0.4.1.dsc
 956fafb452dffd4dba550513aabfcddb 9547 net optional 
open-iscsi_2.0.870~rc3-0.4.1.diff.gz
 cff6a39ee79a1aacd3a4b2c553480481 599844 net optional 
open-iscsi_2.0.870~rc3-0.4.1_amd64.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)
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=s5rC
-----END PGP SIGNATURE-----



--- End Message ---

Reply via email to