[Secure-testing-commits] r1721 - data/DTSA
Andres Salomon
dilinger-guest at costa.debian.org
Mon Aug 29 20:38:38 UTC 2005
Author: dilinger-guest
Date: 2005-08-29 20:38:38 +0000 (Mon, 29 Aug 2005)
New Revision: 1721
Added:
data/DTSA/DTSA-11-1
Modified:
data/DTSA/list
Log:
add maildrop DTSA
Added: data/DTSA/DTSA-11-1
===================================================================
--- data/DTSA/DTSA-11-1 2005-08-29 20:20:17 UTC (rev 1720)
+++ data/DTSA/DTSA-11-1 2005-08-29 20:38:38 UTC (rev 1721)
@@ -0,0 +1,50 @@
+-----------------------------------------------------------------------------
+Debian Testing Security Advisory DTSA-11-1 http://secure-testing.debian.net
+secure-testing-team at lists.alioth.debian.org Andres Salomon
+August 29th, 2005
+-----------------------------------------------------------------------------
+
+Package : maildrop
+Vulnerability : local privilege escalation
+Problem-Type : local
+Debian-specific: yes
+CVE ID : CAN-2005-2655
+
+The lockmail binary shipped with maildrop allows for an attacker to
+obtain an effective gid as group "mail". Debian ships the binary with its
+setgid bit set, but the program does not drop privileges when run. It takes
+an argument that is executed, and since it does not drop privileges, an
+attacker can execute an arbitrary command with an effective gid of the "mail"
+group.
+
+For the testing distribution (etch) this is fixed in version
+1.5.3-1.1etch1.
+
+For the unstable distribution (sid) this is fixed in version
+1.5.3-2.
+
+This upgrade is strongly recommended if you use maildrop.
+
+The Debian testing security team does not track security issues for the
+stable distribution (woody). If stable is vulnerable, the Debian security
+team will make an announcement once a fix is ready.
+
+Upgrade Instructions
+--------------------
+
+To use the Debian testing security archive, add the following lines to
+your /etc/apt/sources.list:
+
+ deb http://secure-testing.debian.net/debian-security-updates etch-proposed-updates/security-updates main contrib non-free
+ deb-src http://secure-testing.debian.net/debian-security-updates etch-proposed-updates/security-updates main contrib non-free
+
+The archive signing key can be downloaded from
+http://secure-testing.debian.net/ziyi-2005-7.asc
+
+To install the update, run this command as root:
+
+ apt-get update && apt-get install maildrop
+
+For further information about the Debian testing security team, please refer
+to http://secure-testing.debian.net/
+
Modified: data/DTSA/list
===================================================================
--- data/DTSA/list 2005-08-29 20:20:17 UTC (rev 1720)
+++ data/DTSA/list 2005-08-29 20:38:38 UTC (rev 1721)
@@ -1,3 +1,6 @@
+[29 Aug 2005] DTSA-11-1 maildrop - local privilege escalation
+ {CAN-2005-2655}
+ - maildrop 1.5.3-1.1etch1 (high)
[01 Jan 1969] DTSA-10-1 pcre3 - buffer overflow
- pcre3 6.3-0.1etch1 (high)
NOTE: joeyh working on it
More information about the Secure-testing-commits
mailing list