Your message dated Sat, 21 Jan 2006 22:17:11 -0800
with message-id <[EMAIL PROTECTED]>
and subject line Bug#349303: fixed in lsh-utils 2.0.1cdbs-4
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--------------------------------------
Received: (at submit) by bugs.debian.org; 22 Jan 2006 05:15:04 +0000
>From [EMAIL PROTECTED] Sat Jan 21 21:15:04 2006
Return-path: <[EMAIL PROTECTED]>
Received: from zenon.ls-hosting.de ([85.10.196.146] ident=foobar)
        by spohr.debian.org with esmtp (Exim 4.50)
        id 1F0XZA-0001F2-MM
        for [EMAIL PROTECTED]; Sat, 21 Jan 2006 21:15:04 -0800
Date: Sun, 22 Jan 2006 06:14:59 +0100
From: Stefan Pfetzing <[EMAIL PROTECTED]>
To: Debian Bug Tracking System <[EMAIL PROTECTED]>
Subject: lsh-server: lshd leaks fd:s to user shells
Message-ID: <[EMAIL PROTECTED]>
MIME-Version: 1.0
Content-Type: text/plain; charset=iso-8859-1
Content-Disposition: inline
Content-Transfer-Encoding: 8bit
X-Reportbug-Version: 3.18
X-Debbugs-Cc: Debian Security Team <[EMAIL PROTECTED]>
User-Agent: Mutt/1.5.11
Sender: Stefan Pfetzing <[EMAIL PROTECTED]>
Delivered-To: [EMAIL PROTECTED]
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-11.0 required=4.0 tests=BAYES_00,HAS_PACKAGE,
        X_DEBBUGS_CC autolearn=ham version=2.60-bugs.debian.org_2005_01_02

Package: lsh-server
Version: 2.0.1cdbs-3
Severity: grave
Tags: security
Tags: sarge
Tags: confirmed
Tags: pending
Justification: denial of service

As reported by Niels Möller, the author of lsh-utils, a user is able to
access fd:s used by lsh.

When logging in through lsh-server a user is able to tamper with
/var/spool/yarrow-seed-file, which can be used to prevent the server
from starting or allow the user guesses about the encryption used by
lsh-server.

Therefore its strongly suggested to apply the patch from Niels.

http://lists.lysator.liu.se/pipermail/lsh-bugs/2006q1/000467.html

Unstable will get a new version including the fix soon.

-- system information excluded
-- debconf information excluded

bye

Stefan Pfetzing

-- 
        http://www.dreamind.de/
Oroborus and Debian GNU/Linux Developer.

---------------------------------------
Received: (at 349303-close) by bugs.debian.org; 22 Jan 2006 06:20:31 +0000
>From [EMAIL PROTECTED] Sat Jan 21 22:20:31 2006
Return-path: <[EMAIL PROTECTED]>
Received: from katie by spohr.debian.org with local (Exim 4.50)
        id 1F0YXH-0000GB-WE; Sat, 21 Jan 2006 22:17:12 -0800
From: Stefan Pfetzing <[EMAIL PROTECTED]>
To: [EMAIL PROTECTED]
X-Katie: $Revision: 1.65 $
Subject: Bug#349303: fixed in lsh-utils 2.0.1cdbs-4
Message-Id: <[EMAIL PROTECTED]>
Sender: Archive Administrator <[EMAIL PROTECTED]>
Date: Sat, 21 Jan 2006 22:17:11 -0800
X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 
        (1.212-2003-09-23-exp) on spohr.debian.org
X-Spam-Level: 
X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER 
        autolearn=no version=2.60-bugs.debian.org_2005_01_02

Source: lsh-utils
Source-Version: 2.0.1cdbs-4

We believe that the bug you reported is fixed in the latest version of
lsh-utils, which is due to be installed in the Debian FTP archive:

lsh-client_2.0.1cdbs-4_i386.deb
  to pool/main/l/lsh-utils/lsh-client_2.0.1cdbs-4_i386.deb
lsh-server_2.0.1cdbs-4_i386.deb
  to pool/main/l/lsh-utils/lsh-server_2.0.1cdbs-4_i386.deb
lsh-utils-doc_2.0.1cdbs-4_all.deb
  to pool/main/l/lsh-utils/lsh-utils-doc_2.0.1cdbs-4_all.deb
lsh-utils_2.0.1cdbs-4.diff.gz
  to pool/main/l/lsh-utils/lsh-utils_2.0.1cdbs-4.diff.gz
lsh-utils_2.0.1cdbs-4.dsc
  to pool/main/l/lsh-utils/lsh-utils_2.0.1cdbs-4.dsc
lsh-utils_2.0.1cdbs-4_i386.deb
  to pool/main/l/lsh-utils/lsh-utils_2.0.1cdbs-4_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Stefan Pfetzing <[EMAIL PROTECTED]> (supplier of updated lsh-utils package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Sun, 22 Jan 2006 06:30:43 +0100
Source: lsh-utils
Binary: lsh-utils lsh-client lsh-utils-doc lsh-server
Architecture: source all i386
Version: 2.0.1cdbs-4
Distribution: unstable
Urgency: high
Maintainer: Simon Law <[EMAIL PROTECTED]>
Changed-By: Stefan Pfetzing <[EMAIL PROTECTED]>
Description: 
 lsh-client - Secure Shell v2 (SSH2) protocol client
 lsh-server - Secure Shell v2 (SSH2) protocol server
 lsh-utils  - Secure Shell v2 (SSH2) protocol utilities
 lsh-utils-doc - Secure Shell v2 (SSH2) client / server / utilities 
documentation
Closes: 337026 348822 348844 349180 349303
Changes: 
 lsh-utils (2.0.1cdbs-4) unstable; urgency=high
 .
   * Remove silly debconf questions and correct others. (Closes: Bug#337026)
   * Switch to dpatch.
   * Make lsh-utils build on a grsecurity system.
   * Remove /var/spool/lsh upon purge.
   * Update Vietnamese debconf translation.
   * Update German debconf translation.
   * Update Danish debconf translation.
   * Update Czech debconf translation.
   * Update Dutch debconf translation.
   * Update Russian debconf translation. (Closes: Bug#349180)
   * Update French debconf translation. (Closes: Bug#348822)
   * Have lsh-server provide ssh-server. (Closes: Bug#348844)
   * Update the watch file format version to the latest (3).
   * Have uscan remove the "cdbs" version extension.
   * Fix fd leak in the lsh-server.
     This is to be security related, so upload it with a high urgency.
     (Closes: Bug#349303)
Files: 
 91eb4d44578221b8730c089188cccc58 929 net extra lsh-utils_2.0.1cdbs-4.dsc
 6b7233c922cde42f71f69183edced51a 39596 net extra lsh-utils_2.0.1cdbs-4.diff.gz
 30c201de019f9080b987cc61e03c4863 105566 doc extra 
lsh-utils-doc_2.0.1cdbs-4_all.deb
 958f2a7676eb9f03d031c82c9d4ab9d6 726476 net extra 
lsh-utils_2.0.1cdbs-4_i386.deb
 12cd4839061a6c8bb549c1bc7145dfe1 203794 net extra 
lsh-server_2.0.1cdbs-4_i386.deb
 9c98e5855e91d484f1d10ddae35c50f8 244636 net extra 
lsh-client_2.0.1cdbs-4_i386.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (GNU/Linux)

iD8DBQFD0x/hi50xCpfDmMsRAiEgAJ9cqgz/rFsup8Bh1Lx+ouM5s5SfswCdH3gK
Lvt291GQtGxIa70k/wnmu9Y=
=ZYU5
-----END PGP SIGNATURE-----


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to