Your message dated Sun, 24 Jan 2010 15:12:31 +0000
with message-id <[email protected]>
and subject line Re: Bug#566684: kfreebsd-7: ZFS security bug, local users may
access unauthorized files - CVE-2010-0318
has caused the Debian Bug report #566684,
regarding kfreebsd-7: ZFS security bug, local users may access unauthorized
files - CVE-2010-0318
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)
--
566684: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=566684
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: kfreebsd-7
Severity: grave
Tags: security
Justification: user security hole
Hi,
the replay functionality for ZFS Intent Log (ZIL) in FreeBSD 7.1, 7.2, and 8.0,
when creating files during replay of a setattr transaction, uses weak
permissions (7777)
instead of the original permissions, which might allow local users to read or
modify
unauthorized files in opportunistic circumstances after a system crash or power
failure.
Further description and patches are available at
http://security.freebsd.org/advisories/FreeBSD-SA-10:03.zfs.asc
see also http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2010-0318
Regards
-- System Information:
Debian Release: squeeze/sid
APT prefers testing
APT policy: (700, 'testing'), (650, 'unstable'), (600, 'experimental'), (500,
'testing-proposed-updates')
Architecture: amd64 (x86_64)
Kernel: Linux 2.6.32.4 (SMP w/2 CPU cores; PREEMPT)
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
--- End Message ---
--- Begin Message ---
fixed-version 7.2-10
--- End Message ---