Your message dated Tue, 12 Dec 2006 15:17:03 +0000
with message-id <[EMAIL PROTECTED]>
and subject line Bug#396104: fixed in mutt 1.5.13-1.1
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--- Begin Message ---
package: mutt
severity: important
tags: security

Some tempfile race condition vulnerabilities have been found in mutt:

CVE-2006-5297:
Race condition in the safe_open function in the Mutt mail client
1.5.12 and earlier, when creating temporary files in an NFS
filesystem, allows local users to overwrite arbitrary files due to
limitations of the use of the O_EXCL flag on NFS filesystems.

CVE-2006-5298:
The mutt_adv_mktemp function in the Mutt mail client 1.5.12 and
earlier does not properly verify that temporary files have been
created with restricted permissions, which might allow local users to
create files with weak permissions via a race condition between the
mktemp and safe_fopen function calls.

See
http://marc.theaimsgroup.com/?l=mutt-dev&m=115999486426292&w=2
for details.

I am not quite sure about the implications, adjust the severity as you 
see fit.

Please mention the CVE id in the changelog.


--- End Message ---
--- Begin Message ---
Source: mutt
Source-Version: 1.5.13-1.1

We believe that the bug you reported is fixed in the latest version of
mutt, which is due to be installed in the Debian FTP archive:

mutt_1.5.13-1.1.diff.gz
  to pool/main/m/mutt/mutt_1.5.13-1.1.diff.gz
mutt_1.5.13-1.1.dsc
  to pool/main/m/mutt/mutt_1.5.13-1.1.dsc
mutt_1.5.13-1.1_amd64.deb
  to pool/main/m/mutt/mutt_1.5.13-1.1_amd64.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Christoph Berg <[EMAIL PROTECTED]> (supplier of updated mutt package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.7
Date: Tue, 12 Dec 2006 14:49:24 +0100
Source: mutt
Binary: mutt
Architecture: source amd64
Version: 1.5.13-1.1
Distribution: unstable
Urgency: high
Maintainer: Adeodato Simó <[EMAIL PROTECTED]>
Changed-By: Christoph Berg <[EMAIL PROTECTED]>
Description: 
 mutt       - text-based mailreader supporting MIME, GPG, PGP and threading
Closes: 396104
Changes: 
 mutt (1.5.13-1.1) unstable; urgency=high
 .
   * Non-maintainer upload.
   * Add upstream patch to fix insecure temp file generation
     (Closes: #396104, CVE-2006-5297, CVE-2006-5298).
Files: 
 7f736974fa210252e03bbcbf02ae6ddc 735 mail standard mutt_1.5.13-1.1.dsc
 5778575f910b7a7a71b34af477b66036 136526 mail standard mutt_1.5.13-1.1.diff.gz
 de01e8d7c9f2bbfc412711ebba92a2d2 1836796 mail standard 
mutt_1.5.13-1.1_amd64.deb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFFfsRzxa93SlhRC1oRAglrAKC1EeYLA0XL3zkV4DxDjpIAiPC+nACdF3L/
yB0wRljvmAbp9TFM/iqoWok=
=y5Il
-----END PGP SIGNATURE-----


--- End Message ---

Reply via email to