Your message dated Tue, 14 Mar 2006 18:13:38 +0100
with message-id <[EMAIL PROTECTED]>
and subject line Fixed in xpvm
has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere. Please contact me immediately.)
Debian bug tracking system administrator
(administrator, Debian Bugs database)
--- Begin Message ---
Package: xpvm
Severity: serious
Tags: security
According to http://secunia.com/advisories/16040:
Eric Romang has reported a vulnerability in xpvm, which can be exploited by
malicious, local users to perform certain actions on a vulnerable system with
escalated privileges.
The vulnerability is caused due to the temporary file "/tmp/xpvm.trace.$user"
being created insecurely by "src/xpvm.tcl". This can be exploited via symlink
attacks to create or overwrite arbitrary files with the privileges of the user
running the affected application.
This is CAN-2005-2240.
--
see shy jo
signature.asc
Description: Digital signature
--- End Message ---
--- Begin Message ---
Version: 1.2.5-8
This bug has been fixed in the upload of 2005-09-04 by Matej Vela, but
was inadvertently reopened for sid. Closing the bug again with the right
version.
Thijs
--- End Message ---