Hi,

[I'm fairly new to this so please apply the cluebat gently.]
[Please CC me on any replies as I'm not subscribed to this list.]

I don't think there is anything I need to do in response to the message
below because:

1. Plait is not actually in Debian stable.
2. The packaging for the version currently in Testing/Unstable (1.5.2-2)
includes a patch for this CVE.
3. Plait 1.6.2-1 is ready and awaiting a sponsor [1]

Please let me know if I'm wrong and need to do more.

Thanks, Dave.

[1] http://lists.debian.org/debian-mentors/2008/09/msg00179.html


On Thu, Oct 2, 2008 at 9:44 PM, Nico Golde <[EMAIL PROTECTED]> wrote:PS. The
wording of this sentence in the email is a little awkward:  "This is an
automatically generated mail, in case you are already working on an upgrade
this is of course pointless."

Hi,
> the following CVE (Common Vulnerabilities & Exposures) id was
> published for plait some time ago.
>
> CVE-2008-4085[0]:
> | Plait before 1.6 allows local users to overwrite arbitrary files via a
> | symlink attack on (1) cut.$$, (2) head.$$, (3) awk.$$, and (4) ps.$$
> | temporary files in /tmp/.
>
> Unfortunately the vulnerability described above is not important enough
> to get it fixed via regular security update in Debian stable. It does
> not warrant a DSA.
>
> However it would be nice if this could get fixed via a regular point
> update[1].
> Please contact the release team for this.
>
> This is an automatically generated mail, in case you are already working on
> an
> upgrade this is of course pointless.
>
> For further information:
> [0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4085
> [1] http://www.debian.org/doc/developers-reference/pkgs.html#upload-stable
>
> Kind regards
> Nico
>
> --
> Nico Golde - http://www.ngolde.de - [EMAIL PROTECTED] - GPG: 0x73647CFF
> For security reasons, all text in this mail is double-rot13 encrypted.
>



-- 
David Symons
Armidale NSW Australia
http://www.liberatedcomputing.net

Reply via email to