Your message dated Sun, 06 Jul 2025 18:04:18 +0000
with message-id <[email protected]>
and subject line Bug#1108428: fixed in acct 6.6.4-7
has caused the Debian Bug report #1108428,
regarding acct: Ubuntu patch for lastcomm buffer overflow should be applied
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)
--
1108428: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1108428
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Source: acct
Version: 6.6.4-6
Severity: important
Tags: upstream
Dear Maintainer,
Extra hardening features enabled at build time (FORTIFY_SOURCE=3) downstream in
Ubuntu expose a buffer overflow in the lastcomm command:
https://bugs.launchpad.net/ubuntu/+source/acct/+bug/2095035
A fix has been applied as a patch by Ubuntu:
https://git.launchpad.net/ubuntu/+source/acct/commit/?id=25e47c5dda4ba79e2debec35cb206b1980c8f8c0
I propose that this patch be applied in Debian.
Thanks!
--- End Message ---
--- Begin Message ---
Source: acct
Source-Version: 6.6.4-7
Done: Andrew Bower <[email protected]>
We believe that the bug you reported is fixed in the latest version of
acct, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Andrew Bower <[email protected]> (supplier of updated acct package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Sun, 06 Jul 2025 16:58:06 +0100
Source: acct
Architecture: source
Version: 6.6.4-7
Distribution: experimental
Urgency: medium
Maintainer: Debian Security Tools <[email protected]>
Changed-By: Andrew Bower <[email protected]>
Closes: 1108428
Changes:
acct (6.6.4-7) experimental; urgency=medium
.
* Team upload.
.
[ Matthew L. Dailey ]
* Import sprintf buffer overflow fix from Ubuntu. (Closes: #1108428)
.
[ Andrew Bower ]
* Add autopkgtest for process accounting
Checksums-Sha1:
0a8b8c8238f1b1746343be790cfbe1e6c7d53f5e 2183 acct_6.6.4-7.dsc
d92996ff3b073a647549063258a05906ddef05f9 24568 acct_6.6.4-7.debian.tar.xz
e21e46f454c9833714a434b6ab4ff18c0faa5f1f 6506 acct_6.6.4-7_amd64.buildinfo
Checksums-Sha256:
94154e1464f76b5c5719af6a9f5ec0cf5ba43e70a7b37f10ce123ce0fca8af53 2183
acct_6.6.4-7.dsc
b8479498c1b7bc04990ec7039e62bbf9e48d2cb32f80a7810a581860e8b763c6 24568
acct_6.6.4-7.debian.tar.xz
3b017f3a5d55784ca2e96a7e38d962479c837576cbbf27213c88fe7799b9b4e6 6506
acct_6.6.4-7_amd64.buildinfo
Files:
5401fee33b7bec68cf06fbe370793dbd 2183 admin optional acct_6.6.4-7.dsc
cfc7db44d56a0902ea220c9c949c671f 24568 admin optional
acct_6.6.4-7.debian.tar.xz
4ca3bb4df4fae7af32f8fdeb59c4f607 6506 admin optional
acct_6.6.4-7_amd64.buildinfo
-----BEGIN PGP SIGNATURE-----
iQIzBAEBCgAdFiEECgzx8d8+AINglLHJt4M9ggJ8mQsFAmhqtWMACgkQt4M9ggJ8
mQtSPg//d41C/7D8nwJSEKjbu9tkkEKLPvmV2C6t/abxJScNc/0VjVyZGTW/8pUN
D/4kQZf5jsDaj8/o1Wef73xKLpOiG9lyLkkycJhxc3FimWzS7Pxus4pHZ3oHSVji
9B1gayZB8/mW1hASxsbk9sko15XblT3fjtOVsdxtT1KdOt1qh+2vQtjB2NXeNidX
ukq13XHp8p8PeW+U0Qo/IdCEVZsp9HFIyUvdgsK/WZqZxaLzXGDOt+tLYShgnA63
1embVEc7Za8xcOqo5CPOiY2MH3kxkonUmu1lGQS6RVrBo1gc2pVIi5wXiIMDvqVG
N5mPYQixw60LLNR2ftaWkArcwHmSG2TCEZQ8mTugO/qwWc7cCKP07JF/6p4hzKvv
cAnEjHiRHPiBcQvRElBGlditlFlB500Xso8QkcBkAqS/EL/Q9fwztwTFcvVrKhK7
unnPUFTDmu3tlTc058nHRwgp/gJ/WKaJluMxNRPtL986W4UZjSN+Aea+XL6arYLY
pfe66wDhVPweFRqInN4kEa/psUdm+JKkeX8JyHvprCbg5aMy3ORst3v5tCa8Yqyx
PMUNbwv3WgXKPKsiTT+YKDMHFecbKZaD1wcnDl5LKseLIa+E3f5PjB+9WyNBoJ/E
rI+j4lA/RwwLZ9nQBHIZCFGGhN+uJ4HN1bU8Yg5IjV/zOQKD6As=
=+l/u
-----END PGP SIGNATURE-----
pgpENRKaP9ggi.pgp
Description: PGP signature
--- End Message ---