Your message dated Sat, 21 Jan 2006 22:17:11 -0800 with message-id <[EMAIL PROTECTED]> and subject line Bug#349303: fixed in lsh-utils 2.0.1cdbs-4 has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) -------------------------------------- Received: (at submit) by bugs.debian.org; 22 Jan 2006 05:15:04 +0000 >From [EMAIL PROTECTED] Sat Jan 21 21:15:04 2006 Return-path: <[EMAIL PROTECTED]> Received: from zenon.ls-hosting.de ([85.10.196.146] ident=foobar) by spohr.debian.org with esmtp (Exim 4.50) id 1F0XZA-0001F2-MM for [EMAIL PROTECTED]; Sat, 21 Jan 2006 21:15:04 -0800 Date: Sun, 22 Jan 2006 06:14:59 +0100 From: Stefan Pfetzing <[EMAIL PROTECTED]> To: Debian Bug Tracking System <[EMAIL PROTECTED]> Subject: lsh-server: lshd leaks fd:s to user shells Message-ID: <[EMAIL PROTECTED]> MIME-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: inline Content-Transfer-Encoding: 8bit X-Reportbug-Version: 3.18 X-Debbugs-Cc: Debian Security Team <[EMAIL PROTECTED]> User-Agent: Mutt/1.5.11 Sender: Stefan Pfetzing <[EMAIL PROTECTED]> Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Level: X-Spam-Status: No, hits=-11.0 required=4.0 tests=BAYES_00,HAS_PACKAGE, X_DEBBUGS_CC autolearn=ham version=2.60-bugs.debian.org_2005_01_02 Package: lsh-server Version: 2.0.1cdbs-3 Severity: grave Tags: security Tags: sarge Tags: confirmed Tags: pending Justification: denial of service As reported by Niels Möller, the author of lsh-utils, a user is able to access fd:s used by lsh. When logging in through lsh-server a user is able to tamper with /var/spool/yarrow-seed-file, which can be used to prevent the server from starting or allow the user guesses about the encryption used by lsh-server. Therefore its strongly suggested to apply the patch from Niels. http://lists.lysator.liu.se/pipermail/lsh-bugs/2006q1/000467.html Unstable will get a new version including the fix soon. -- system information excluded -- debconf information excluded bye Stefan Pfetzing -- http://www.dreamind.de/ Oroborus and Debian GNU/Linux Developer. --------------------------------------- Received: (at 349303-close) by bugs.debian.org; 22 Jan 2006 06:20:31 +0000 >From [EMAIL PROTECTED] Sat Jan 21 22:20:31 2006 Return-path: <[EMAIL PROTECTED]> Received: from katie by spohr.debian.org with local (Exim 4.50) id 1F0YXH-0000GB-WE; Sat, 21 Jan 2006 22:17:12 -0800 From: Stefan Pfetzing <[EMAIL PROTECTED]> To: [EMAIL PROTECTED] X-Katie: $Revision: 1.65 $ Subject: Bug#349303: fixed in lsh-utils 2.0.1cdbs-4 Message-Id: <[EMAIL PROTECTED]> Sender: Archive Administrator <[EMAIL PROTECTED]> Date: Sat, 21 Jan 2006 22:17:11 -0800 X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Level: X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER autolearn=no version=2.60-bugs.debian.org_2005_01_02 Source: lsh-utils Source-Version: 2.0.1cdbs-4 We believe that the bug you reported is fixed in the latest version of lsh-utils, which is due to be installed in the Debian FTP archive: lsh-client_2.0.1cdbs-4_i386.deb to pool/main/l/lsh-utils/lsh-client_2.0.1cdbs-4_i386.deb lsh-server_2.0.1cdbs-4_i386.deb to pool/main/l/lsh-utils/lsh-server_2.0.1cdbs-4_i386.deb lsh-utils-doc_2.0.1cdbs-4_all.deb to pool/main/l/lsh-utils/lsh-utils-doc_2.0.1cdbs-4_all.deb lsh-utils_2.0.1cdbs-4.diff.gz to pool/main/l/lsh-utils/lsh-utils_2.0.1cdbs-4.diff.gz lsh-utils_2.0.1cdbs-4.dsc to pool/main/l/lsh-utils/lsh-utils_2.0.1cdbs-4.dsc lsh-utils_2.0.1cdbs-4_i386.deb to pool/main/l/lsh-utils/lsh-utils_2.0.1cdbs-4_i386.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Stefan Pfetzing <[EMAIL PROTECTED]> (supplier of updated lsh-utils package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Format: 1.7 Date: Sun, 22 Jan 2006 06:30:43 +0100 Source: lsh-utils Binary: lsh-utils lsh-client lsh-utils-doc lsh-server Architecture: source all i386 Version: 2.0.1cdbs-4 Distribution: unstable Urgency: high Maintainer: Simon Law <[EMAIL PROTECTED]> Changed-By: Stefan Pfetzing <[EMAIL PROTECTED]> Description: lsh-client - Secure Shell v2 (SSH2) protocol client lsh-server - Secure Shell v2 (SSH2) protocol server lsh-utils - Secure Shell v2 (SSH2) protocol utilities lsh-utils-doc - Secure Shell v2 (SSH2) client / server / utilities documentation Closes: 337026 348822 348844 349180 349303 Changes: lsh-utils (2.0.1cdbs-4) unstable; urgency=high . * Remove silly debconf questions and correct others. (Closes: Bug#337026) * Switch to dpatch. * Make lsh-utils build on a grsecurity system. * Remove /var/spool/lsh upon purge. * Update Vietnamese debconf translation. * Update German debconf translation. * Update Danish debconf translation. * Update Czech debconf translation. * Update Dutch debconf translation. * Update Russian debconf translation. (Closes: Bug#349180) * Update French debconf translation. (Closes: Bug#348822) * Have lsh-server provide ssh-server. (Closes: Bug#348844) * Update the watch file format version to the latest (3). * Have uscan remove the "cdbs" version extension. * Fix fd leak in the lsh-server. This is to be security related, so upload it with a high urgency. (Closes: Bug#349303) Files: 91eb4d44578221b8730c089188cccc58 929 net extra lsh-utils_2.0.1cdbs-4.dsc 6b7233c922cde42f71f69183edced51a 39596 net extra lsh-utils_2.0.1cdbs-4.diff.gz 30c201de019f9080b987cc61e03c4863 105566 doc extra lsh-utils-doc_2.0.1cdbs-4_all.deb 958f2a7676eb9f03d031c82c9d4ab9d6 726476 net extra lsh-utils_2.0.1cdbs-4_i386.deb 12cd4839061a6c8bb549c1bc7145dfe1 203794 net extra lsh-server_2.0.1cdbs-4_i386.deb 9c98e5855e91d484f1d10ddae35c50f8 244636 net extra lsh-client_2.0.1cdbs-4_i386.deb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.2 (GNU/Linux) iD8DBQFD0x/hi50xCpfDmMsRAiEgAJ9cqgz/rFsup8Bh1Lx+ouM5s5SfswCdH3gK Lvt291GQtGxIa70k/wnmu9Y= =ZYU5 -----END PGP SIGNATURE----- -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]