Your message dated Fri, 05 Aug 2016 22:37:29 +0000
with message-id <e1bvnk9-0001jg...@franck.debian.org>
and subject line Bug#831813: fixed in nullmailer 1:1.13-1.2
has caused the Debian Bug report #831813,
regarding nullmailer leaks sensitive data through debconf
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
831813: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=831813
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: nullmailer
Version: 1:1.13-1
Severity: grave

The nullmailer package keeps sensitive information like users and passwords to
the mail accounts on the remote SMTP servers in the '/etc/nullmailer/remotes'
file, which is secured by 600 permissions and owned by mail:mail. However,
after running command:

  dpkg-reconfigure -f noninteractive nullmailer

contents of this file are stored in the debconf database as cleartext in the
'nullmailer/relayhost' database key and can be read by any user using the
command:

  debconf-get-selections | grep nullmailer

The 'dpkg-reconfigure' command cannot be executed directly by unprivileged
users. However, the debconf database reads the contents of the
'/etc/nullmailer/remotes' file and includes its contents in the database on
package installation.

This behaviour occurs again on package reinstallation - the debconf database
is automatically updated with the contents of the '/etc/nullmailer/remotes'
file. Therefore the sensitive information might show up in the
'debconf-get-selections' output after an automatic package upgrade or package
reinstallation.

Regards,
Maciej

Attachment: pgp53hDPWd09g.pgp
Description: PGP signature


--- End Message ---
--- Begin Message ---
Source: nullmailer
Source-Version: 1:1.13-1.2

We believe that the bug you reported is fixed in the latest version of
nullmailer, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 831...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Christian Hofstaedtler <z...@debian.org> (supplier of updated nullmailer 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Sun, 31 Jul 2016 20:57:13 +0000
Source: nullmailer
Binary: nullmailer
Architecture: source
Version: 1:1.13-1.2
Distribution: unstable
Urgency: medium
Maintainer: Nick Leverton <n...@leverton.org>
Changed-By: Christian Hofstaedtler <z...@debian.org>
Description:
 nullmailer - simple relay-only mail transport agent
Closes: 831813
Changes:
 nullmailer (1:1.13-1.2) unstable; urgency=medium
 .
   * Non-maintainer upload.
   * Do not keep relayhost data in debconf database longer than
     strictly needed. (Closes: #831813)
Checksums-Sha1:
 1ec52cc832332074394e1b6fb5d73a966571166a 1804 nullmailer_1.13-1.2.dsc
 4a777ec343bb0745361ab9a527c111c22c8075bd 30760 
nullmailer_1.13-1.2.debian.tar.xz
Checksums-Sha256:
 7b3d9732f4f930242686059e97236c42cf2703332313241168cb6f80859df189 1804 
nullmailer_1.13-1.2.dsc
 48c15f5df55069a12a5318eab3a8ca7d50d34ca6769c153f436e359f9f16a1a1 30760 
nullmailer_1.13-1.2.debian.tar.xz
Files:
 07ffbbe682603e0098dfdc94ed94439d 1804 mail extra nullmailer_1.13-1.2.dsc
 57ba3876663778c19a4b572e31be64c9 30760 mail extra 
nullmailer_1.13-1.2.debian.tar.xz

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=+I+Z
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to