[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20041223113534.GB29921@box79162.elkhouse.de>
From: martin.pitt at canonical.com (Martin Pitt)
Subject: [USN-49-1] debmake vulnerability
===========================================================
Ubuntu Security Notice USN-49-1 December 23, 2004
debmake vulnerability
CAN-2004-1179
===========================================================
A security issue affects the following Ubuntu releases:
Ubuntu 4.10 (Warty Warthog)
The following packages are affected:
debmake
The problem can be corrected by upgrading the affected package to
version 3.7.4ubuntu0.1. In general, a standard system upgrade is
sufficient to effect the necessary changes.
Details follow:
Javier Fern?ndez-Sanguino Pe?a noticed that the debstd script from
debmake, a deprecated helper package for Debian packaging, created
temporary directories in an insecure manner. This could allow a
symlink attack to create or overwrite arbitrary files with the
privileges of the user invoking the program.
Source archives:
http://security.ubuntu.com/ubuntu/pool/main/d/debmake/debmake_3.7.4ubuntu0.1.dsc
Size/MD5: 565 530fc54f928a366dfbec2188ac5bd2d7
http://security.ubuntu.com/ubuntu/pool/main/d/debmake/debmake_3.7.4ubuntu0.1.tar.gz
Size/MD5: 40185 4f465bc55202b85579283f0a6e48a07c
Architecture independent packages:
http://security.ubuntu.com/ubuntu/pool/main/d/debmake/debmake_3.7.4ubuntu0.1_all.deb
Size/MD5: 44686 85d26bbc8e69cb24b8f3e6b5632f4814
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: Digital signature
Url : http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20041223/aeddaccd/attachment.bin
Powered by blists - more mailing lists