Your message dated Thu, 30 Sep 2010 21:32:29 +0000
with message-id <e1p1qjt-0002bm...@franck.debian.org>
and subject line Bug#598294: fixed in lastfm 1:1.5.4.26862+dfsg-5
has caused the Debian Bug report #598294,
regarding lastfm: CVE-2010-3362: insecure library loading
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
598294: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=598294
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: lastfm
Version: 1:1.5.4.26862+dfsg-4
Severity: grave
Tags: security
User: t...@security.debian.org
Usertags: ldpath

Hello,

During a review of the Debian archive, I've found your package to
contain a script that can be abused by an attacker to execute arbitrary
code.

The vulnerability is introduced by an insecure change to
LD_LIBRARY_PATH, and environment variable used by ld.so(8) to look for
libraries on a directory other than the standard paths.

Vulnerable code follows:

/usr/bin/lastfm line 4:
export LD_LIBRARY_PATH="${RUNDIR}:${LD_LIBRARY_PATH}"

When there's an empty item on the colon-separated list of
LD_LIBRARY_PATH, ld.so treats it as '.' (i.e. CWD/$PWD.)
If the given script is executed from a directory where a potential,
local, attacker can write files to, there's a chance to exploit this
bug.

This vulnerability has been assigned the CVE id CVE-2010-3362. Please make sure
you mention it when forwarding this report to upstream and when fixing
this bug (everywhere: upstream and here at Debian.)

[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3362
[1] http://security-tracker.debian.org/tracker/CVE-2010-3362

Sincerely,
Raphael Geissert



--- End Message ---
--- Begin Message ---
Source: lastfm
Source-Version: 1:1.5.4.26862+dfsg-5

We believe that the bug you reported is fixed in the latest version of
lastfm, which is due to be installed in the Debian FTP archive:

lastfm_1.5.4.26862+dfsg-5.debian.tar.gz
  to main/l/lastfm/lastfm_1.5.4.26862+dfsg-5.debian.tar.gz
lastfm_1.5.4.26862+dfsg-5.dsc
  to main/l/lastfm/lastfm_1.5.4.26862+dfsg-5.dsc
lastfm_1.5.4.26862+dfsg-5_amd64.deb
  to main/l/lastfm/lastfm_1.5.4.26862+dfsg-5_amd64.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 598...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
John Stamp <jst...@users.sourceforge.net> (supplier of updated lastfm package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.8
Date: Thu, 30 Sep 2010 14:03:23 -0700
Source: lastfm
Binary: lastfm
Architecture: source amd64
Version: 1:1.5.4.26862+dfsg-5
Distribution: unstable
Urgency: high
Maintainer: John Stamp <jst...@users.sourceforge.net>
Changed-By: John Stamp <jst...@users.sourceforge.net>
Description: 
 lastfm     - a music player for Last.fm personalized radio
Closes: 598294
Changes: 
 lastfm (1:1.5.4.26862+dfsg-5) unstable; urgency=high
 .
   * Fix CVE-2010-3362: insecure library loading (Closes: #598294)
Checksums-Sha1: 
 478692f7bcad61edf6261b8af60ee12bf807eca1 1324 lastfm_1.5.4.26862+dfsg-5.dsc
 31c268d8e0b05e0271f5d764f5c82adaf8fdd842 67914 
lastfm_1.5.4.26862+dfsg-5.debian.tar.gz
 607217ce8bd142f70cce9a81caa27e26131d948f 1645896 
lastfm_1.5.4.26862+dfsg-5_amd64.deb
Checksums-Sha256: 
 5389c17f2e6e625c252786ca22df1fca99ba53abc2b18bc9e459e5a8fa516297 1324 
lastfm_1.5.4.26862+dfsg-5.dsc
 1d85eb0460770badcbce1c78bbd7fdc07eeb5aa4ea34296e80a6d964980c1336 67914 
lastfm_1.5.4.26862+dfsg-5.debian.tar.gz
 d25035355631e98691a326159194f75381556319275004091dfab1a3f73059ed 1645896 
lastfm_1.5.4.26862+dfsg-5_amd64.deb
Files: 
 968b7551bc736671427e9da1222c2ae4 1324 sound optional 
lastfm_1.5.4.26862+dfsg-5.dsc
 339d1b5c3d511f903e0edd78b2cc00ea 67914 sound optional 
lastfm_1.5.4.26862+dfsg-5.debian.tar.gz
 f66b3cd40e0c8d3f1740d251bf309438 1645896 sound optional 
lastfm_1.5.4.26862+dfsg-5_amd64.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)

iEYEARECAAYFAkyk/RgACgkQbU7/TZgP4UQDAgCgoHjXTPzLKcZATBGGokc0Ee4g
BjgAn2LkZ++WX3GefCJaieShkxXl23wW
=Oaxw
-----END PGP SIGNATURE-----



--- End Message ---

Reply via email to