Your message dated Mon, 18 Apr 2011 08:35:55 +0200
with message-id <20110418063555.ga9...@an3as.eu>
and subject line Bug#612035: Fixed in 1.12
has caused the Debian Bug report #612035,
regarding vulnerability: rewrite arbitrary user file
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
612035: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=612035
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: feh
Version: 1.10-1
Severity: grave
Tags: security
Justification: user security hole
User: ubuntu-de...@lists.ubuntu.com
Usertags: origin-ubuntu natty

This bug report was also filed in Ubuntu and can be found at
http://launchpad.net/bugs/607328
The description, from segooon, follows:

Binary package hint: feh

Hi, I've just discovered that feh is vulnerable to rewriting any user file:

      tmpname_timestamper =
         estrjoin("", "/tmp/feh_", cppid, "_", basename, NULL);
....
            execlp("wget", "wget", "-N", "-O", tmpname_timestamper, newurl,
                   quiet, (char*) NULL);

If attacker knows PID of feh and knows the URL, it can create the link to any 
user file. wget would overwrite it.

Thanks.

-- System Information:
Debian Release: squeeze/sid
  APT prefers natty
  APT policy: (500, 'natty')
Architecture: amd64 (x86_64)

Kernel: Linux 2.6.37-12-generic (SMP w/4 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash



--- End Message ---
--- Begin Message ---
Hi,

as Francesco correctly pointed out this bug should be closed (just
forgot to mention it in the changelog).  Thanks for the hint

     Andreas.

----- Forwarded message from Francesco Poli <invernom...@paranoici.org> -----

X-Debian-PR-Message: followup 612035
X-Debian-PR-Package: feh
X-Debian-PR-Keywords: security
X-Debian-PR-Source: feh
Date: Fri, 15 Apr 2011 22:08:22 +0200
From: Francesco Poli <invernom...@paranoici.org>
To: 612...@bugs.debian.org
Cc: Daniel Friesel <d...@finalrewind.org>
Subject: [Pkg-phototools-devel] Bug#612035: Fixed in 1.12

On Sun, 13 Mar 2011 06:52:24 +0100 Daniel Friesel wrote:

> Hi,
> 
> feh 1.12 has just been released, which fixes this bug by switching from wget
> to mkstemp + libcurl.
> 
> <http://feh.finalrewind.org/changelog>
> <http://feh.finalrewind.org/feh-1.12.tar.bz2>


Hi, if the security team confirms that the vulnerability is really
fixed in feh version 1.12, I think that this bug report should be
closed as fixed in feh/1.12-1 ...

Or am I wrong?

----- End forwarded message -----

-- 
http://fam-tille.de


--- End Message ---

Reply via email to