Activity log for bug #1210215

Date Who What changed Old value New value Message
2013-08-08 17:18:03 Andreas Moog bug added bug
2013-08-08 17:18:05 Andreas Moog bug watch added http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=705690
2013-08-08 17:18:06 Andreas Moog libuser (Debian): remote watch Debian Bug tracker #705690
2013-08-08 17:18:18 Andreas Moog libuser (Ubuntu): status New Triaged
2013-08-08 17:18:20 Andreas Moog libuser (Ubuntu): importance Undecided High
2013-08-08 17:18:41 Andreas Moog cve linked 2012-5630
2013-08-08 17:18:50 Andreas Moog cve linked 2012-5644
2013-08-08 17:20:17 Andreas Moog information type Public Public Security
2013-08-08 17:26:17 Andreas Moog description Imported from Debian bug http://bugs.debian.org/705690: Package: libuser Severity: important Tags: security Hi, the following vulnerabilities were published for libuser. CVE-2012-5630[0]: TOCTOU race conditions by copying and removing directory trees CVE-2012-5644[1]: (Complete) Information disclosure when moving user's home directory The patch however looks unfortunately quite substantial, see [2], so might be better to update for unstable directly to the new upstream version. Ghe, are you still interested/maintaining the package? I wonder because there was no upload since 2008 apart NMUs. If you fix the vulnerabilities please also make sure to include the CVE (Common Vulnerabilities & Exposures) ids in your changelog entry. For further information see: [0] http://security-tracker.debian.org/tracker/CVE-2012-5630 [1] http://security-tracker.debian.org/tracker/CVE-2012-5644 [2] https://bugzilla.redhat.com/show_bug.cgi?id=885724#c7 Regards, Salvatore Imported from Debian bug http://bugs.debian.org/705690: Package: libuser Severity: important Tags: security Hi, the following vulnerabilities were published for libuser. CVE-2012-5630[0]: TOCTOU race conditions by copying and removing directory trees CVE-2012-5644[1]: (Complete) Information disclosure when moving user's home directory The patch however looks unfortunately quite substantial, see [2], so might be better to update for unstable directly to the new upstream version. If you fix the vulnerabilities please also make sure to include the CVE (Common Vulnerabilities & Exposures) ids in your changelog entry. For further information see: [0] http://security-tracker.debian.org/tracker/CVE-2012-5630 [1] http://security-tracker.debian.org/tracker/CVE-2012-5644 [2] https://bugzilla.redhat.com/show_bug.cgi?id=885724#c7 Regards, Salvatore
2013-08-08 18:32:40 Bug Watch Updater libuser (Debian): importance Undecided Unknown
2014-05-20 13:13:05 Bug Watch Updater libuser (Debian): status New Fix Released
2016-05-27 11:57:58 Mattia Rizzolo libuser (Ubuntu): status Triaged Fix Released