lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Mon Apr  4 10:25:19 2005
From: martin.pitt at canonical.com (Martin Pitt)
Subject: [USN-104-1] unshar vulnerability

===========================================================
Ubuntu Security Notice USN-104-1	     April 04, 2005
sharutils vulnerability
https://bugzilla.ubuntu.com/show_bug.cgi?id=8459
===========================================================

A security issue affects the following Ubuntu releases:

Ubuntu 4.10 (Warty Warthog)

The following packages are affected:

sharutils

The problem can be corrected by upgrading the affected package to
version 1:4.2.1-10ubuntu0.2.  In general, a standard system upgrade is
sufficient to effect the necessary changes.

Details follow:

Joey Hess discovered that "unshar" created temporary files in an
insecure manner. This could allow a symbolic link attack to create or
overwrite arbitrary files with the privileges of the user invoking the
program.

  Source archives:

    http://security.ubuntu.com/ubuntu/pool/main/s/sharutils/sharutils_4.2.1-10ubuntu0.2.diff.gz
      Size/MD5:     8181 7135804300d9a381cfebc2133e7239c2
    http://security.ubuntu.com/ubuntu/pool/main/s/sharutils/sharutils_4.2.1-10ubuntu0.2.dsc
      Size/MD5:      634 1a16efd9010325d369909b608fb59597
    http://security.ubuntu.com/ubuntu/pool/main/s/sharutils/sharutils_4.2.1.orig.tar.gz
      Size/MD5:   306022 b8ba1d409f07edcb335ff72a27bd9828

  Architecture independent packages:

    http://security.ubuntu.com/ubuntu/pool/main/s/sharutils/sharutils-doc_4.2.1-10ubuntu0.2_all.deb
      Size/MD5:    28000 56cd083b2fbc3e689cb157a59c760f52

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)

    http://security.ubuntu.com/ubuntu/pool/main/s/sharutils/sharutils_4.2.1-10ubuntu0.2_amd64.deb
      Size/MD5:   113908 801afa19d2f272d22f7d13f5efb0a51a

  i386 architecture (x86 compatible Intel/AMD)

    http://security.ubuntu.com/ubuntu/pool/main/s/sharutils/sharutils_4.2.1-10ubuntu0.2_i386.deb
      Size/MD5:   110766 2d3e74efceff274a2bb4a17b3c4702b1

  powerpc architecture (Apple Macintosh G3/G4/G5)

    http://security.ubuntu.com/ubuntu/pool/main/s/sharutils/sharutils_4.2.1-10ubuntu0.2_powerpc.deb
      Size/MD5:   112656 1ce41914dde0c8d548f6bcc2d3a8fbd8
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: Digital signature
Url : http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20050404/0eb035b2/attachment.bin

Powered by blists - more mailing lists