Debian Bug report logs -
#375617
spread: CVE-2006-3118: insecure temporary file handling
Reported by: Martin Pitt <mpitt@debian.org>
Date: Tue, 27 Jun 2006 07:48:21 UTC
Severity: normal
Tags: security
Fixed in version spread/3.17.3-4
Done: Michael Mende <debian@menole.net>
Bug is archived. No further changes may be made.
Toggle useless messages
Report forwarded to debian-bugs-dist@lists.debian.org, Michael Mende <debian@menole.net>:
Bug#375617; Package spread.
(full text, mbox, link).
Acknowledgement sent to Martin Pitt <mpitt@debian.org>:
New Bug report received and forwarded. Copy sent to Michael Mende <debian@menole.net>.
(full text, mbox, link).
Message #5 received at submit@bugs.debian.org (full text, mbox, reply):
[Message part 1 (text/plain, inline)]
Package: spread
Severity: normal
Tags: security
Hi,
recently, a bug about insecure temporary file handling was filed in
Ubuntu [1]. After looking into the code, it does not seem that bad at
all (removal of an already existing file which might be important, and
a small race condition for a local DoS). However, it should be cleaned
up.
"On start, spread creates a file /tmp/PORTNUMBER where PORTNUMBER is
4803 by default.
If an existing file named /tmp/PORTNUMBER exists, it will be deleted
before a socket with the same name is created."
It probably does not deserve a CVE number, but now that it has got
one, please mention it in the changelog when you fix this
(CVE-2006-3118).
Can you please pass this to upstream?
Thanks,
Martin
[1] https://launchpad.net/bugs/44171
--
Martin Pitt http://www.piware.de
Ubuntu Developer http://www.ubuntu.com
Debian Developer http://www.debian.org
In a world without walls and fences, who needs Windows and Gates?
[signature.asc (application/pgp-signature, inline)]
Changed Bug title.
Request was from Alec Berryman <alec@thened.net>
to control@bugs.debian.org.
(full text, mbox, link).
Information forwarded to debian-bugs-dist@lists.debian.org, Michael Mende <debian@menole.net>:
Bug#375617; Package spread.
(full text, mbox, link).
Acknowledgement sent to Martin Schulze <joey@infodrom.org>:
Extra info received and forwarded to list. Copy sent to Michael Mende <debian@menole.net>.
(full text, mbox, link).
Message #12 received at 375617@bugs.debian.org (full text, mbox, reply):
[Message part 1 (text/plain, inline)]
Attached is a patch that simply changes the pathname.
Regards,
Joey
--
Testing? What's that? If it compiles, it is good, if it boots up, it is perfect.
Please always Cc to me when replying to me on the lists.
[spread-3.17.2_tmpfile.patch (text/plain, attachment)]
Information forwarded to debian-bugs-dist@lists.debian.org, Michael Mende <debian@menole.net>:
Bug#375617; Package spread.
(full text, mbox, link).
Acknowledgement sent to Alec Berryman <alec@thened.net>:
Extra info received and forwarded to list. Copy sent to Michael Mende <debian@menole.net>.
(full text, mbox, link).
Message #17 received at 375617@bugs.debian.org (full text, mbox, reply):
[Message part 1 (text/plain, inline)]
Hi Michael,
Just a friendly reminder that #375617 is an outstanding security issue
with spread. There's a patch in the BTS. It would be great to have
this fixed for etch.
Thanks,
Alec
[signature.asc (application/pgp-signature, inline)]
Reply sent to Michael Mende <debian@menole.net>:
You have taken responsibility.
(full text, mbox, link).
Notification sent to Martin Pitt <mpitt@debian.org>:
Bug acknowledged by developer.
(full text, mbox, link).
Message #22 received at 375617-close@bugs.debian.org (full text, mbox, reply):
Source: spread
Source-Version: 3.17.3-4
We believe that the bug you reported is fixed in the latest version of
spread, which is due to be installed in the Debian FTP archive:
libspread-perl_3.17.3-4_amd64.deb
to pool/main/s/spread/libspread-perl_3.17.3-4_amd64.deb
libspread1-dev_3.17.3-4_amd64.deb
to pool/main/s/spread/libspread1-dev_3.17.3-4_amd64.deb
libspread1_3.17.3-4_amd64.deb
to pool/main/s/spread/libspread1_3.17.3-4_amd64.deb
spread_3.17.3-4.diff.gz
to pool/main/s/spread/spread_3.17.3-4.diff.gz
spread_3.17.3-4.dsc
to pool/main/s/spread/spread_3.17.3-4.dsc
spread_3.17.3-4_amd64.deb
to pool/main/s/spread/spread_3.17.3-4_amd64.deb
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to 375617@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Michael Mende <debian@menole.net> (supplier of updated spread package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmaster@debian.org)
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.7
Date: Sun, 10 Sep 2006 12:13:43 +0200
Source: spread
Binary: libspread1-dev spread libspread1 libspread-perl
Architecture: source amd64
Version: 3.17.3-4
Distribution: unstable
Urgency: high
Maintainer: Michael Mende <debian@menole.net>
Changed-By: Michael Mende <debian@menole.net>
Description:
libspread-perl - Perl bindings for the Spread messaging service
libspread1 - C library for the Spread messaging service
libspread1-dev - Development files for libspread
spread - The Spread messaging daemon
Closes: 375617
Changes:
spread (3.17.3-4) unstable; urgency=high
.
* CVE-2006-3118: insecure temporary file handling (Closes: #375617)
* Build depends now on dpatch
* Update standards version to 3.7.2
Files:
615e82179bf9cad908afa5577d5fe3e2 702 net optional spread_3.17.3-4.dsc
61cab5b08c07c50b292d2abce836f7b5 10141 net optional spread_3.17.3-4.diff.gz
cdce64c483773cea3d2a592ab30e14e1 81346 libdevel optional libspread1-dev_3.17.3-4_amd64.deb
a4a2b415c3ede3283fd1ea97e338e0d7 56000 libs optional libspread1_3.17.3-4_amd64.deb
91aa02793a98984fcf7da2abf31b1e9b 31792 perl optional libspread-perl_3.17.3-4_amd64.deb
79e3fdfe67441882cf911e4e010463f3 201812 net optional spread_3.17.3-4_amd64.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.5 (GNU/Linux)
iD8DBQFFFAWE6n7So0GVSSARAuF1AJ4yA+cZlB6qSuIZ88UEBfo35xNaeQCfddO5
WtRSTTNP+ZZtNz2SGenAifs=
=JzTN
-----END PGP SIGNATURE-----
Bug archived.
Request was from Debbugs Internal Request <owner@bugs.debian.org>
to internal_control@bugs.debian.org.
(Sun, 24 Jun 2007 18:18:28 GMT) (full text, mbox, link).
Send a report that this bug log contains spam.
Debian bug tracking system administrator <owner@bugs.debian.org>.
Last modified:
Thu Mar 11 04:08:35 2021;
Machine Name:
buxtehude
Debian Bug tracking system
Debbugs is free software and licensed under the terms of the GNU
Public License version 2. The current version can be obtained
from https://bugs.debian.org/debbugs-source/.
Copyright © 1999 Darren O. Benham,
1997,2003 nCipher Corporation Ltd,
1994-97 Ian Jackson,
2005-2017 Don Armstrong, and many other contributors.