[<prev] [next>] [day] [month] [year] [list]
Message-ID: <m1CFB4Q-000okKC__10142.5465931699$1097087826$gmane$org@finlandia.Infodrom.North.DE>
Date: Wed, 6 Oct 2004 14:39:02 +0200 (CEST)
From: joey@...odrom.org (Martin Schulze)
To: bugtraq@...urityfocus.com
Subject: [SECURITY] [DSA 559-1] New net-acct packages fix insecure temporary file creation
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- --------------------------------------------------------------------------
Debian Security Advisory DSA 559-1 security@...ian.org
http://www.debian.org/security/ Martin Schulze
October 6th, 2004 http://www.debian.org/security/faq
- --------------------------------------------------------------------------
Package : net-acct
Vulnerability : insecure temporary file
Problem-Type : local
Debian-specific: no
CVE ID : CAN-2004-0851
Debian Bug : 270359
Stefan Nordhausen has identified a local security hole in net-acct, a
user-mode IP accounting daemon. Old and redundant code from some time
way back in the past created a temporary file in an insecure fashion.
For the stable distribution (woody) this problem has been fixed in
version 0.71-5woody1.
For the unstable distribution (sid) this problem has been fixed in
version 0.71-7.
We recommend that you upgrade your net-acct package.
Upgrade Instructions
- --------------------
wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.
If you are using the apt-get package manager, use the line for
sources.list as given below:
apt-get update
will update the internal database
apt-get upgrade
will install corrected packages
You may use an automated update by adding the resources from the
footer to the proper configuration.
Debian GNU/Linux 3.0 alias woody
- --------------------------------
Source archives:
http://security.debian.org/pool/updates/main/n/net-acct/net-acct_0.71-5woody1.dsc
Size/MD5 checksum: 562 72c93549d6dd86d7365d206706ff9a62
http://security.debian.org/pool/updates/main/n/net-acct/net-acct_0.71-5woody1.diff.gz
Size/MD5 checksum: 9950 ab1dd923a4e18d520793c34738d2a8f4
http://security.debian.org/pool/updates/main/n/net-acct/net-acct_0.71.orig.tar.gz
Size/MD5 checksum: 44741 87daae6d4b06144534205b3fc201c058
Alpha architecture:
http://security.debian.org/pool/updates/main/n/net-acct/net-acct_0.71-5woody1_alpha.deb
Size/MD5 checksum: 52922 339d98c59e34655dc8762e076251fbd3
ARM architecture:
http://security.debian.org/pool/updates/main/n/net-acct/net-acct_0.71-5woody1_arm.deb
Size/MD5 checksum: 50096 f7a21521634202264dacfae238716bf5
Intel IA-32 architecture:
http://security.debian.org/pool/updates/main/n/net-acct/net-acct_0.71-5woody1_i386.deb
Size/MD5 checksum: 49346 c90d2f7b3f777905c5f8f90f8edd6b57
Intel IA-64 architecture:
http://security.debian.org/pool/updates/main/n/net-acct/net-acct_0.71-5woody1_ia64.deb
Size/MD5 checksum: 58530 df761be43caec7fa543d37279c265afd
HP Precision architecture:
http://security.debian.org/pool/updates/main/n/net-acct/net-acct_0.71-5woody1_hppa.deb
Size/MD5 checksum: 51702 145f469e3c2bfae125ff4e0a23729a0a
Motorola 680x0 architecture:
http://security.debian.org/pool/updates/main/n/net-acct/net-acct_0.71-5woody1_m68k.deb
Size/MD5 checksum: 46882 e1dabe763136c5cfd0b04de8fd691fb7
Big endian MIPS architecture:
http://security.debian.org/pool/updates/main/n/net-acct/net-acct_0.71-5woody1_mips.deb
Size/MD5 checksum: 49332 7393517e4ac4f83e0fbc6efda5118a2f
Little endian MIPS architecture:
http://security.debian.org/pool/updates/main/n/net-acct/net-acct_0.71-5woody1_mipsel.deb
Size/MD5 checksum: 49380 60ae8a7d4c1265fb07adaaf6d49cbe2f
PowerPC architecture:
http://security.debian.org/pool/updates/main/n/net-acct/net-acct_0.71-5woody1_powerpc.deb
Size/MD5 checksum: 49824 3442f397b0db858aa4bfb9e4d418a5f4
IBM S/390 architecture:
http://security.debian.org/pool/updates/main/n/net-acct/net-acct_0.71-5woody1_s390.deb
Size/MD5 checksum: 47688 69c06b385a4ff25df34dd60052c88fc4
Sun Sparc architecture:
http://security.debian.org/pool/updates/main/n/net-acct/net-acct_0.71-5woody1_sparc.deb
Size/MD5 checksum: 51684 083a1078e261fd3621f37f17c8305885
These files will probably be moved into the stable distribution on
its next update.
- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@...ts.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.5 (GNU/Linux)
iD8DBQFBY+dmW5ql+IAeqTIRAuOjAKCcFfAtJBrSdp8RoUiPHkvlmWU3GQCgjJdI
FwMrf2WeGJ47K7dtO5IwHfI=
=Lv9/
-----END PGP SIGNATURE-----
Powered by blists - more mailing lists