Your message dated Thu, 02 Dec 2010 00:33:31 +0000
with message-id <e1pnx75-0007yn...@franck.debian.org>
and subject line Bug#598309: fixed in ust 0.5-1+squeeze1
has caused the Debian Bug report #598309,
regarding ust-bin: CVE-2010-3386: insecure library loading
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)
--
598309: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=598309
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: ust-bin
Version: 0.7-1
Severity: grave
Tags: security
User: t...@security.debian.org
Usertags: ldpath
Hello,
During a review of the Debian archive, I've found your package to
contain a script that can be abused by an attacker to execute arbitrary
code.
The vulnerability is introduced by an insecure change to
LD_LIBRARY_PATH, and environment variable used by ld.so(8) to look for
libraries on a directory other than the standard paths.
Vulnerable code follows:
/usr/bin/usttrace line 136:
export LD_LIBRARY_PATH="$LD_LIBRARY_PATH:${LIBUST_PATH%libust.so}"
/usr/bin/usttrace line 144:
export LD_LIBRARY_PATH="$LD_LIBRARY_PATH:${LIBUST_PATH%libust.so}"
When there's an empty item on the colon-separated list of
LD_LIBRARY_PATH, ld.so treats it as '.' (i.e. CWD/$PWD.)
If the given script is executed from a directory where a potential,
local, attacker can write files to, there's a chance to exploit this
bug.
This vulnerability has been assigned the CVE id CVE-2010-3386. Please make sure
you mention it when forwarding this report to upstream and when fixing
this bug (everywhere: upstream and here at Debian.)
[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3386
[1] http://security-tracker.debian.org/tracker/CVE-2010-3386
Sincerely,
Raphael Geissert
--- End Message ---
--- Begin Message ---
Source: ust
Source-Version: 0.5-1+squeeze1
We believe that the bug you reported is fixed in the latest version of
ust, which is due to be installed in the Debian FTP archive:
libust-dev_0.5-1+squeeze1_amd64.deb
to main/u/ust/libust-dev_0.5-1+squeeze1_amd64.deb
libust0_0.5-1+squeeze1_amd64.deb
to main/u/ust/libust0_0.5-1+squeeze1_amd64.deb
ust-bin_0.5-1+squeeze1_amd64.deb
to main/u/ust/ust-bin_0.5-1+squeeze1_amd64.deb
ust_0.5-1+squeeze1.debian.tar.gz
to main/u/ust/ust_0.5-1+squeeze1.debian.tar.gz
ust_0.5-1+squeeze1.dsc
to main/u/ust/ust_0.5-1+squeeze1.dsc
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to 598...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Jon Bernard <jbern...@debian.org> (supplier of updated ust package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.8
Date: Wed, 01 Dec 2010 19:10:09 -0500
Source: ust
Binary: libust0 libust-dev ust-bin
Architecture: source amd64
Version: 0.5-1+squeeze1
Distribution: testing
Urgency: low
Maintainer: Jon Bernard <jbern...@debian.org>
Changed-By: Jon Bernard <jbern...@debian.org>
Description:
libust-dev - LTTng Userspace Tracer (development)
libust0 - LTTng Userspace Tracer (runtime)
ust-bin - LTTng Userspace Tracer (utilities)
Closes: 598309
Changes:
ust (0.5-1+squeeze1) testing; urgency=low
.
* [893a2e] Backport upstream fix for CVE-2010-3386 (Closes: #598309)
Checksums-Sha1:
5a71ef7d1d3311ff4d9981cdfee4291feb24cd08 1207 ust_0.5-1+squeeze1.dsc
67d33202f7eeb9ee81bed69721ff35c25120f167 7064 ust_0.5-1+squeeze1.debian.tar.gz
21ccb497a082e1afda7113dfebb1f44bb17b12d0 92440 libust0_0.5-1+squeeze1_amd64.deb
44dbce9cc22c75ffa0f436502eba8f7b6544922b 104230
libust-dev_0.5-1+squeeze1_amd64.deb
79860d134ab4062906b2cb2be5081fd43e8592be 56366 ust-bin_0.5-1+squeeze1_amd64.deb
Checksums-Sha256:
149b746ad54a0744dbe0b9d37022de9ae63831235f4cb84b76f9a3357e3b50b6 1207
ust_0.5-1+squeeze1.dsc
d9e672232f3a63004be1ce3df8d23a188ac4cdb7564a45e9406dc69a2cf05947 7064
ust_0.5-1+squeeze1.debian.tar.gz
ba03277e19656052c3ee4d686928ea8f362a3d73205d0f8d704e67df95beea79 92440
libust0_0.5-1+squeeze1_amd64.deb
1ff928f9c672bc9cbd87ce92d262b3185426c66b703201013eba32312c79d83c 104230
libust-dev_0.5-1+squeeze1_amd64.deb
695f52c625d72fd3e68c148a8b527660c61a1dbd0f153db22cfe7fdff8fb61ed 56366
ust-bin_0.5-1+squeeze1_amd64.deb
Files:
cfca6a23b8110d29bd75efd239abb1ba 1207 libs extra ust_0.5-1+squeeze1.dsc
b45f7da587772206bbe040388734eb14 7064 libs extra
ust_0.5-1+squeeze1.debian.tar.gz
0246ce02d7345ac83a44e149e0a1fe0c 92440 libs extra
libust0_0.5-1+squeeze1_amd64.deb
4d9168a655e877c6ee60a1e263cc703e 104230 libdevel extra
libust-dev_0.5-1+squeeze1_amd64.deb
da7c5ee4a3a66083378e1cb1aec3b68a 56366 utils extra
ust-bin_0.5-1+squeeze1_amd64.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)
iEYEARECAAYFAkz25aAACgkQwAT2A1kSwn7eBQCeKFMPpWmQ7uMQDHC7L9a9IGx3
8+EAn3OpGOHyEhCMwYaLRXhnl3vh4OtG
=uwmI
-----END PGP SIGNATURE-----
--- End Message ---