Bug#973748: marked as done (sddm: CVE-2020-28049: local privilege escalation due to race condition in creation of the Xauthority file)

2020-11-13 Thread Debian Bug Tracking System
Your message dated Fri, 13 Nov 2020 11:03:37 + with message-id and subject line Bug#973748: fixed in sddm 0.18.0-1+deb10u1 has caused the Debian Bug report #973748, regarding sddm: CVE-2020-28049: local privilege escalation due to race condition in creation of the Xauthority file to be

Bug#973748: sddm: CVE-2020-28049: local privilege escalation due to race condition in creation of the Xauthority file

2020-11-05 Thread Salvatore Bonaccorso
Hi Norbert, On Thu, Nov 05, 2020 at 09:15:15PM +0900, Norbert Preining wrote: > Hi Salvatore, > > On Thu, 05 Nov 2020, Salvatore Bonaccorso wrote: > > to day, this is the debdiff I just used for the upload. tracker.d.o > > does not show it yet because the packages are sitting in the embargoed > >

Bug#973748: sddm: CVE-2020-28049: local privilege escalation due to race condition in creation of the Xauthority file

2020-11-05 Thread Norbert Preining
Hi Salvatore, On Thu, 05 Nov 2020, Salvatore Bonaccorso wrote: > to day, this is the debdiff I just used for the upload. tracker.d.o > does not show it yet because the packages are sitting in the embargoed > policy queue on security-master so not yet pushed out to the archive. Ah, ok, didn't know

Bug#973748: sddm: CVE-2020-28049: local privilege escalation due to race condition in creation of the Xauthority file

2020-11-05 Thread Salvatore Bonaccorso
Hi Norbert, On Thu, Nov 05, 2020 at 08:55:40PM +0900, Norbert Preining wrote: > Hi Salvatore, > > > That is because I did already upload the upload yesterday as with the > > debdiff attached to the bugreport. But we (Moritz was testing as well) > > wanted to further test the upload first before r

Bug#973748: sddm: CVE-2020-28049: local privilege escalation due to race condition in creation of the Xauthority file

2020-11-05 Thread Norbert Preining
Hi Salvatore, > That is because I did already upload the upload yesterday as with the > debdiff attached to the bugreport. But we (Moritz was testing as well) > wanted to further test the upload first before releasing the DSA. A ok, that explains it. Didn't see any message about it, so I

Bug#973748: sddm: CVE-2020-28049: local privilege escalation due to race condition in creation of the Xauthority file

2020-11-05 Thread Salvatore Bonaccorso
Hi Norbert, On Thu, Nov 05, 2020 at 08:26:07PM +0900, Norbert Preining wrote: > Hi Salvatore, hi FTP Master, > > @Salvatore: thanks for the NMU preparation. We are now preparing a fix > for unstable via version 0.19, and at the same time I thought I upload > to buster-security, based on your patc

Bug#973748: sddm: CVE-2020-28049: local privilege escalation due to race condition in creation of the Xauthority file

2020-11-05 Thread Norbert Preining
Hi Salvatore, hi FTP Master, @Salvatore: thanks for the NMU preparation. We are now preparing a fix for unstable via version 0.19, and at the same time I thought I upload to buster-security, based on your patch, But, uploading to security-master with dput I got the following answer: On Thu, 05 N

Bug#973748: sddm: CVE-2020-28049: local privilege escalation due to race condition in creation of the Xauthority file

2020-11-04 Thread Salvatore Bonaccorso
; The following vulnerability was published for sddm. > > CVE-2020-28049[0]: > | local privilege escalation due to race condition in creation of the > | Xauthority file > > If you fix the vulnerability please also make sure to include the > CVE (Common Vulnerabilities &am

Bug#973748: sddm: CVE-2020-28049: local privilege escalation due to race condition in creation of the Xauthority file

2020-11-04 Thread Salvatore Bonaccorso
creation of the | Xauthority file If you fix the vulnerability please also make sure to include the CVE (Common Vulnerabilities & Exposures) id in your changelog entry. For further information see: [0] https://security-tracker.debian.org/tracker/CVE-2020-28049 https://cve.mitre.org/cgi

Bug#495601: marked as done (kdm: Creates $HOME/.Xauthority with root:root ownership)

2010-03-06 Thread Debian Bug Tracking System
Your message dated Sun, 7 Mar 2010 08:39:49 +0100 with message-id <6a2e33621003062339l50e9d2a2mc581957b56a12...@mail.gmail.com> and subject line Re: Bug#495601: About bug # 495601 in Debian BTS has caused the Debian Bug report #495601, regarding kdm: Creates $HOME/.Xauthority with roo

Bug#199063: marked as done (kdm does not set XAUTHORITY)

2006-05-12 Thread Debian Bug Tracking System
trator (administrator, Debian Bugs database) --- Begin Message --- Package: kdm Version: 3.1.2-1 Kdm does not set the environment variable XAUTHORITY to $HOME/.Xauthority when it is not already set. As it is done by startx and gdm I suppose it should do it. It is a problem because if you do a su to

xauthority

2005-06-14 Thread Nick Torys
I noticed, for some time now, that every time I turn my machine on, my .Xauthority gets overwritten giving me the following message when I ssh to another machine: Warning: No xauth data; using fake authentication data for X11 forwarding. I have to copy back my backed up .Xauthority in