Your message dated Mon, 20 Oct 2008 09:32:09 +0000
with message-id <[EMAIL PROTECTED]>
and subject line Bug#502680: fixed in nfs-utils 1:1.1.2-6lenny1
has caused the Debian Bug report #502680,
regarding nfs-utils issue (CVE-2008-4552)
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [EMAIL PROTECTED]
immediately.)


-- 
502680: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=502680
Debian Bug Tracking System
Contact [EMAIL PROTECTED] with problems
--- Begin Message ---
Package: nfs-utils
Version: 1:1.1.2-6
Severity: serious
Tags: patch security pending
Owner: Steffen Joeris <[EMAIL PROTECTED]>

On Sun, Oct 19, 2008 at 11:57:28AM +1100, Steffen Joeris wrote:
>Hi
>
>I am currently looking at the new nfs-utils issue[0]. Red Hat has more
>information in their bugreport[1] including the patch. I am trying to
>figure out the severity of this issue. Now, I am not using nfs in any
>complex environment, so I am not sure. From what I can read in the
>bugreport, it only means that the netgroup privileges are ignored, thus
>additional privileges you should have are missing. Therefore, it
>doesn't sound too severe, but I am probably missing something. What's
>your opinion on the issue?
> 
>(BTW it's fixed in unstable, but apparently not in lenny or etch).
>
>Cheers Steffen
>
>[0]: 
>http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4552://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4552
>[1]: https://bugzilla.redhat.com/show_bug.cgi?id=458676


--- support/misc/tcpwrapper.c   2008-03-15 02:46:29.000000000 +1100
+++ support/misc/tcpwrapper.c   2008-10-19 13:58:12.000000000 +1100
@@ -125,12 +125,12 @@ struct sockaddr_in *addr;
           return 0;
 
    /* Check the official name first. */
-   if (hosts_ctl(daemon, "", hp->h_name, ""))
+   if (hosts_ctl(daemon, hp->h_name, "", ""))
        return 1;
 
    /* Check aliases. */
    for (sp = hp->h_aliases; *sp ; sp++) {
-       if (hosts_ctl(daemon, "", *sp, ""))
+       if (hosts_ctl(daemon, *sp, "", ""))
            return 1;
    }
 

Attachment: signature.asc
Description: Digital signature


--- End Message ---
--- Begin Message ---
Source: nfs-utils
Source-Version: 1:1.1.2-6lenny1

We believe that the bug you reported is fixed in the latest version of
nfs-utils, which is due to be installed in the Debian FTP archive:

nfs-common_1.1.2-6lenny1_amd64.deb
  to pool/main/n/nfs-utils/nfs-common_1.1.2-6lenny1_amd64.deb
nfs-kernel-server_1.1.2-6lenny1_amd64.deb
  to pool/main/n/nfs-utils/nfs-kernel-server_1.1.2-6lenny1_amd64.deb
nfs-utils_1.1.2-6lenny1.diff.gz
  to pool/main/n/nfs-utils/nfs-utils_1.1.2-6lenny1.diff.gz
nfs-utils_1.1.2-6lenny1.dsc
  to pool/main/n/nfs-utils/nfs-utils_1.1.2-6lenny1.dsc



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Anibal Monsalve Salazar <[EMAIL PROTECTED]> (supplier of updated nfs-utils 
package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.8
Date: Sun, 19 Oct 2008 13:37:33 +1100
Source: nfs-utils
Binary: nfs-kernel-server nfs-common
Architecture: source amd64
Version: 1:1.1.2-6lenny1
Distribution: testing-proposed-updates
Urgency: high
Maintainer: Anibal Monsalve Salazar <[EMAIL PROTECTED]>
Changed-By: Anibal Monsalve Salazar <[EMAIL PROTECTED]>
Description: 
 nfs-common - NFS support files common to client and server
 nfs-kernel-server - support for NFS kernel server
Closes: 502680
Changes: 
 nfs-utils (1:1.1.2-6lenny1) testing-proposed-updates; urgency=high
 .
   * Fix CVE-2008-4552
     nfs-utils 1.1.2, and possibly other versions before 1.1.3, invokes the
     host_ctl function with the wrong order of arguments, which causes TCP
     Wrappers to ignore netgroups and allows remote attackers to bypass
     intended access restrictions.
     Closes: #502680
Checksums-Sha1: 
 4b07baf7f03c12af8495250633aa97ef0e7d265d 1332 nfs-utils_1.1.2-6lenny1.dsc
 ab4f25acd858c7b3d35a9c7d63825aa0130e1f68 34519 nfs-utils_1.1.2-6lenny1.diff.gz
 3ef772056babdacc07f08ecc7876da6d9b1c5bf5 161630 
nfs-kernel-server_1.1.2-6lenny1_amd64.deb
 2ab5ebe2964864fbec172aceb4c3238fd1aac18a 203758 
nfs-common_1.1.2-6lenny1_amd64.deb
Checksums-Sha256: 
 d2f9436b855e575c9681b29a5586594df7b07220a2b1836a3aacdfba56ceefb8 1332 
nfs-utils_1.1.2-6lenny1.dsc
 3074523d4105b551fb0dea051f9cf8344097d6987c28b7590276bb414a20a09d 34519 
nfs-utils_1.1.2-6lenny1.diff.gz
 fed9f2f9ffc310ddcfb5e565f85031643a5c9c4cac0cd05aeb2170add61da519 161630 
nfs-kernel-server_1.1.2-6lenny1_amd64.deb
 afc397d7e2dc6922de9ddf0008f19fc3e93e65db44f530b1d80531936fa422d9 203758 
nfs-common_1.1.2-6lenny1_amd64.deb
Files: 
 5e58cd1a3f30f69cce122c67d3227719 1332 net standard nfs-utils_1.1.2-6lenny1.dsc
 624892a894706fd0c989b479d4d52529 34519 net standard 
nfs-utils_1.1.2-6lenny1.diff.gz
 6230b83d7fc1d63fe0e5572606fd9155 161630 net optional 
nfs-kernel-server_1.1.2-6lenny1_amd64.deb
 a5a3b83933f97c3e70f0a129a09db641 203758 net standard 
nfs-common_1.1.2-6lenny1_amd64.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEARECAAYFAkj8TuYACgkQgY5NIXPNpFWOjACdHDvflWmEmk34z+lEjCbRT+yJ
6kIAnjOIfib6zlnBWaZR5n4aSoHUwguE
=drLo
-----END PGP SIGNATURE-----



--- End Message ---

Reply via email to