Your message dated Wed, 16 Apr 2008 03:21:56 +0000
with message-id <[EMAIL PROTECTED]>
and subject line Bug#476313: fixed
has caused the Debian Bug report #476313,
regarding RM: tss -- RoM: security problems, never part of release
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
476313: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=476313
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
--- Begin Message ---
Package: ftp.debian.org

Due to security vulernabilities of this package and upstream not being 
able to correctly fix them. Please refer to the following chat log:

15:06 >jcristau< AnAnt: the code is broken
15:07 >nion< AnAnt: it does not tell you the password is invalid it does tell 
you I need to be SUID for VT locking.\n
15:07 <nion> because the effective user id is not 0 (root) if(geteuid() != 0){
15:07 <AnAnt> nion: yes, I removed the geteuid() != 0 check
15:08 >nion< AnAnt: why do tell me this _now_?
15:08 <AnAnt> nion: if getpwuid does not need suid, then I don't need this 
geteuid check, do I ?
15:08 <nion> args
15:08 <jcristau> it tries to read /etc/shadow
15:08 <jcristau> to get your password
15:08 <nion> lol
15:09 <jcristau> seriously that my_getpwuid function is full of crap
15:09 <AnAnt> jcristau: what do you suggest ?
15:10 <nion> oh it uses getspnam()
15:10 <jcristau> nion: yeah
15:10 >jcristau< AnAnt: i suggest to stop distributing that in debian
15:11 <nion> ACK looking at the fact that the upstream also doesn't seem to 
know what he is doing i think it makes no sense to fix this cause we would have 
to check every new upload. sadly vulnerable people stay vulnerable this way

-- 
 أحمد المحمودي (Ahmed El-Mahmoudy)
  Digital design engineer
 GPG KeyID: 0x9DCA0B27 (@ subkeys.pgp.net)
 GPG Fingerprint: 087D 3767 8CAC 65B1 8F6C  156E D325 C3C8 9DCA 0B27



--- End Message ---
--- Begin Message ---
We believe that the bug you reported is now fixed; the following
package(s) have been removed from unstable:

       tss |    0.8.1-3 | source, alpha, amd64, arm, armel, hppa, i386, ia64, 
m68k, mips, mipsel, powerpc, s390, sparc

Note that the package(s) have simply been removed from the tag
database and may (or may not) still be in the pool; this is not a bug.
The package(s) will be physically removed automatically when no suite
references them (and in the case of source, when no binary references
it).  Please also remember that the changes have been done on the
master archive (ftp-master.debian.org) and will not propagate to any
mirrors (ftp.debian.org included) until the next cron.daily run at the
earliest.

Packages are never removed from testing by hand.  Testing tracks
unstable and will automatically remove packages which were removed
from unstable when removing them from testing causes no dependency
problems.

Bugs which have been reported against this package are not automatically
removed from the Bug Tracking System.  Please check all open bugs and
close them or re-assign them to another package if the removed package
was superseded by another one.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED]

This message was generated automatically; if you believe that there is
a problem with it please contact the archive administrators by mailing
[EMAIL PROTECTED]

Debian distribution maintenance software
pp.
Anthony Towns (the ftpmaster behind the curtain)


--- End Message ---

Reply via email to