emacs22: CVE-2010-0825 movemail vulnerable to symlink attacks due to race condition

Related Vulnerabilities: CVE-2010-0825  

Debian Bug report logs - #590301
emacs22: CVE-2010-0825 movemail vulnerable to symlink attacks due to race condition

version graph

Package: emacs22; Maintainer for emacs22 is Rob Browning <rlb@defaultvalue.org>; Source for emacs22 is src:emacs (PTS, buildd, popcon).

Reported by: Nico Golde <nion@debian.org>

Date: Sun, 25 Jul 2010 17:57:04 UTC

Severity: grave

Tags: security

Fixed in version emacs22/22.3+1-1

Done: "Thomas Preud'homme" <robotux@celest.fr>

Bug is archived. No further changes may be made.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, Rob Browning <rlb@defaultvalue.org>:
Bug#590301; Package emacs22. (Sun, 25 Jul 2010 17:57:06 GMT) (full text, mbox, link).


Acknowledgement sent to Nico Golde <nion@debian.org>:
New Bug report received and forwarded. Copy sent to Rob Browning <rlb@defaultvalue.org>. (Sun, 25 Jul 2010 17:57:06 GMT) (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: Nico Golde <nion@debian.org>
To: submit@bugs.debian.org
Subject: emacs22: CVE-2010-0825 movemail vulnerable to symlink attacks due to race condition
Date: Sun, 25 Jul 2010 19:58:00 +0200
[Message part 1 (text/plain, inline)]
Package: emacs22
Severity: grave
Tags: security

Hi,
the following CVE (Common Vulnerabilities & Exposures) id was
published for emacs22.

CVE-2010-0825[0]:
| lib-src/movemail.c in movemail in emacs 22 and 23 allows local users
| to read, modify, or delete arbitrary mailbox files via a symlink
| attack, related to improper file-permission checks.

If you fix the vulnerability please also make sure to include the
CVE id in your changelog entry.

For further information see:

[0] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0825
    http://security-tracker.debian.org/tracker/CVE-2010-0825

-- 
Nico Golde - http://www.ngolde.de - nion@jabber.ccc.de - GPG: 0xA0A0AAAA
For security reasons, all text in this mail is double-rot13 encrypted.
[Message part 2 (application/pgp-signature, inline)]

Bug 590301 cloned as bug 590303. Request was from Nico Golde <nion@debian.org> to control@bugs.debian.org. (Sun, 25 Jul 2010 18:03:13 GMT) (full text, mbox, link).


Marked as fixed in versions emacs22/22.3+1-1. Request was from "Thomas Preud'homme" <robotux@celest.fr> to control@bugs.debian.org. (Fri, 18 May 2012 12:27:29 GMT) (full text, mbox, link).


Marked Bug as done Request was from "Thomas Preud'homme" <robotux@celest.fr> to control@bugs.debian.org. (Fri, 18 May 2012 12:27:31 GMT) (full text, mbox, link).


Notification sent to Nico Golde <nion@debian.org>:
Bug acknowledged by developer. (Fri, 18 May 2012 12:27:32 GMT) (full text, mbox, link).


Message sent on to Nico Golde <nion@debian.org>:
Bug#590301. (Fri, 18 May 2012 12:33:44 GMT) (full text, mbox, link).


Message #16 received at 590301-submitter@bugs.debian.org (full text, mbox, reply):

From: "Thomas Preud'homme" <robotux@celest.fr>
To: control@bugs.debian.org
Cc: 590301-submitter@bugs.debian.org
Subject: closing 590301
Date: Fri, 18 May 2012 14:19:39 +0200
close 590301 22.3+1-1
thanks

emacs22 has been removed from Debian. The issue is fixed in emacs23 according
to [1]

[1] http://security-tracker.debian.org/tracker/CVE-2010-0825





Bug archived. Request was from Debbugs Internal Request <owner@bugs.debian.org> to internal_control@bugs.debian.org. (Sat, 16 Jun 2012 07:32:13 GMT) (full text, mbox, link).


Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Wed Jun 19 19:04:36 2019; Machine Name: buxtehude

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.