Login
Newsletter
Werbung

Sicherheit: Ungeprüfte Verwendung von symbolischen Links in joe
Aktuelle Meldungen Distributionen
Name: Ungeprüfte Verwendung von symbolischen Links in joe
ID:
Distribution: Debian
Plattformen: Debian potato
Datum: Mi, 22. November 2000, 12:00
Referenzen: Keine Angabe
Applikationen: Joe's own editor

Originalnachricht

-----BEGIN PGP SIGNED MESSAGE-----


------------------------------------------------------------------------
Debian Security Advisory security@debian.org
http://www.debian.org/security/ Wichert Akkerman
November 22, 2000
------------------------------------------------------------------------


Package : joe
Problem type : symlink attack
Debian-specific: no

When joe (Joe's Own Editor) dies due to a signal instead of a normal
exit it saves a list of the files it is editing to a file called `DEADJOE'
in its current directory. Unfortunately this wasn't done safely which made
joe vulnerable to a symlink attack.

This has been fixed in version 2.8-15.1 .

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.


Debian GNU/Linux 2.2 alias potato
---------------------------------

Potato was released for alpha, arm, i386, m68k, powerpc and sparc.

Source archives:
joe_2.8-15.1.diff.gz
MD5 checksum: 94131d7638b028e6bd6f529747b9d318
joe_2.8-15.1.dsc
MD5 checksum: 5ad45a1fa1a293bef03786f9258bf846
joe_2.8.orig.tar.gz
MD5 checksum: 84c1aebfce7876b8639945da3c29f204

Alpha architecture:
joe_2.8-15.1_alpha.deb
MD5 checksum: defbc5c39a2ae8ed000b7b302ecd339f

ARM architecture:
joe_2.8-15.1_arm.deb
MD5 checksum: bcb70726840c2cf11cba068ce2a826be

Intel ia32 architecture:
joe_2.8-15.1_i386.deb
MD5 checksum: 21444255b240be01132208e5cb1d3439

Motorola 680x0 architecture:
joe_2.8-15.1_m68k.deb
MD5 checksum: a4b275c324956489bf7558d42a80f22f

PowerPC architecture:
joe_2.8-15.1_powerpc.deb
MD5 checksum: 689d54abe039ded6e82bf60115737631

Sun Sparc architecture:
joe_2.8-15.1_sparc.deb
MD5 checksum: 8846236e9158cf3f3d7f1b8edce73d40

These files will be moved into
ftp://ftp.debian.org/debian/dists/stable/*/binary-$arch/ soon.

For not yet released architectures please refer to the appropriate
directory ftp://ftp.debian.org/debian/dists/sid/binary-$arch/ .

--
----------------------------------------------------------------------------
apt-get: deb http://security.debian.org/ stable/updates main
dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3ia
Charset: noconv

iQB1AwUBOhsaEajZR/ntlUftAQGsNQL/YhFzIUOMo1qiwTjdaRTqUj548q3Snlpd
TkkqWAMMCzA+uh60N/BWTe2/q8/oktG3UoT0eCNV/8LeiC9nqvxBrvwG+gA7oDag
IvYUUzR1rQ33vU0O9nITfaO+2BIGQezM
=0zSi
-----END PGP SIGNATURE-----


--
To UNSUBSCRIBE, email to debian-security-announce-request@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact
listmaster@lists.debian.org
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung