[Secure-testing-commits] r1721 - data/DTSA

Andres Salomon dilinger-guest at costa.debian.org
Mon Aug 29 20:38:38 UTC 2005


Author: dilinger-guest
Date: 2005-08-29 20:38:38 +0000 (Mon, 29 Aug 2005)
New Revision: 1721

Added:
   data/DTSA/DTSA-11-1
Modified:
   data/DTSA/list
Log:
add maildrop DTSA


Added: data/DTSA/DTSA-11-1
===================================================================
--- data/DTSA/DTSA-11-1	2005-08-29 20:20:17 UTC (rev 1720)
+++ data/DTSA/DTSA-11-1	2005-08-29 20:38:38 UTC (rev 1721)
@@ -0,0 +1,50 @@
+-----------------------------------------------------------------------------
+Debian Testing Security Advisory DTSA-11-1    http://secure-testing.debian.net
+secure-testing-team at lists.alioth.debian.org                     Andres Salomon
+August 29th, 2005
+-----------------------------------------------------------------------------
+
+Package        : maildrop
+Vulnerability  : local privilege escalation
+Problem-Type   : local
+Debian-specific: yes
+CVE ID         : CAN-2005-2655
+
+The lockmail binary shipped with maildrop allows for an attacker to
+obtain an effective gid as group "mail".  Debian ships the binary with its
+setgid bit set, but the program does not drop privileges when run.  It takes
+an argument that is executed, and since it does not drop privileges, an
+attacker can execute an arbitrary command with an effective gid of the "mail"
+group.
+
+For the testing distribution (etch) this is fixed in version
+1.5.3-1.1etch1.
+
+For the unstable distribution (sid) this is fixed in version
+1.5.3-2.
+
+This upgrade is strongly recommended if you use maildrop.
+
+The Debian testing security team does not track security issues for the
+stable distribution (woody). If stable is vulnerable, the Debian security
+team will make an announcement once a fix is ready.
+
+Upgrade Instructions
+--------------------
+
+To use the Debian testing security archive, add the following lines to
+your /etc/apt/sources.list:
+
+  deb http://secure-testing.debian.net/debian-security-updates etch-proposed-updates/security-updates main contrib non-free
+  deb-src http://secure-testing.debian.net/debian-security-updates etch-proposed-updates/security-updates main contrib non-free
+
+The archive signing key can be downloaded from
+http://secure-testing.debian.net/ziyi-2005-7.asc
+
+To install the update, run this command as root:
+
+  apt-get update && apt-get install maildrop
+
+For further information about the Debian testing security team, please refer
+to http://secure-testing.debian.net/
+

Modified: data/DTSA/list
===================================================================
--- data/DTSA/list	2005-08-29 20:20:17 UTC (rev 1720)
+++ data/DTSA/list	2005-08-29 20:38:38 UTC (rev 1721)
@@ -1,3 +1,6 @@
+[29 Aug 2005] DTSA-11-1 maildrop - local privilege escalation
+	{CAN-2005-2655}
+	- maildrop 1.5.3-1.1etch1 (high)
 [01 Jan 1969] DTSA-10-1 pcre3 - buffer overflow
 	- pcre3 6.3-0.1etch1 (high)
 	NOTE: joeyh working on it




More information about the Secure-testing-commits mailing list