Login
Newsletter
Werbung

Sicherheit: Unsichere Verwendung von /tmp in dialog
Aktuelle Meldungen Distributionen
Name: Unsichere Verwendung von /tmp in dialog
ID: DSA-008-1
Distribution: Debian
Plattformen: Debian potato
Datum: Di, 26. Dezember 2000, 12:00
Referenzen: Keine Angabe
Applikationen: cdialog

Originalnachricht

-----BEGIN PGP SIGNED MESSAGE-----

------------------------------------------------------------------------
Debian Security Advisory DSA-008-1 security@debian.org
http://www.debian.org/security/ Wichert Akkerman
December 25, 2000
------------------------------------------------------------------------


Package : dialog
Problem type : insecure temporary files
Debian-specific: no

Matt Kraai reported that he found a problem in the way dialog
creates lock-files: it did not create them safely which made it
susceptible to a symlink attack.

This has been fixed in version 0.9a-20000118-3bis.

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.


Debian GNU/Linux 2.2 alias potato
---------------------------------

Potato was released for alpha, arm, i386, m68k, powerpc and sparc.

Source archives:
dialog_0.9a-20000118-3bis.diff.gz
MD5 checksum: 78b6e69859bc18f738982d4f1bd390c7
dialog_0.9a-20000118-3bis.dsc
MD5 checksum: 9bd63778ae6f295d9c06d22ac5910b92
dialog_0.9a-20000118.orig.tar.gz
MD5 checksum: ffa7381631cb24aa5d61dab7f2f1245b

Alpha architecture:
dialog_0.9a-20000118-3bis_alpha.deb
MD5 checksum: 57c04e1f8dec33de5dffee92d0b162cb

ARM architecture:
dialog_0.9a-20000118-3bis_arm.deb
MD5 checksum: 5735033a17262209a1130459229a0982

Intel ia32 architecture:
dialog_0.9a-20000118-3bis_i386.deb
MD5 checksum: f38bbfaa0076a590fe2421eb2ab68a9f

Motorola 680x0 architecture:
dialog_0.9a-20000118-3bis_m68k.deb
MD5 checksum: e7d0985d05a750c6550dd778ab14863e

PowerPC architecture:
dialog_0.9a-20000118-3bis_powerpc.deb
MD5 checksum: 13033d33c56d4e18e8442cc2debaa6f8

Sun Sparc architecture:
dialog_0.9a-20000118-3bis_sparc.deb
MD5 checksum: c310130da0b7ba8ad8d52003db9669c3

These files will be moved into
ftp://ftp.debian.org/debian/dists/stable/*/binary-$arch/ soon.

For not yet released architectures please refer to the appropriate
directory ftp://ftp.debian.org/debian/dists/sid/binary-$arch/ .

--
----------------------------------------------------------------------------
apt-get: deb http://security.debian.org/ stable/updates main
dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3ia
Charset: noconv

iQB1AwUBOkafS6jZR/ntlUftAQFqtAL+ME6epOsFPyt5P5czRQZEfy15QgIQtAN3
+NmrXDpiioNniJY9qHipQMRBJyfubaDh1Ly0XianNvnxT9PrVBzI3JxmFBlhjKMf
GkYLRKFgZow5grNZwA64Nenh0EV9+yvQ
=Q5Mf
-----END PGP SIGNATURE-----


--
To UNSUBSCRIBE, email to debian-security-announce-request@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact
listmaster@lists.debian.org
Pro-Linux
Unterstützer werden
Neue Nachrichten
Werbung