lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20100310204844.GA24960@ngolde.de>
Date: Wed, 10 Mar 2010 21:48:44 +0100
From: Nico Golde <nion@...ian.org>
To: debian-security-announce@...ts.debian.org
Subject: [SECURITY] [DSA 2011-1] New dpkg packages fix
	path traversal

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- --------------------------------------------------------------------------
Debian Security Advisory DSA-2011-1                    security@...ian.org
http://www.debian.org/security/                                 Nico Golde
March 10th, 2010                        http://www.debian.org/security/faq
- --------------------------------------------------------------------------

Package        : dpkg
Vulnerability  : path traversal
Problem type   : local
Debian-specific: yes
Debian bug     : none
CVE ID         : CVE-2010-0396

William Grant discovered that the dpkg-source component of dpkg, the
low-level infrastructure for handling the installation and removal of
Debian software packages, is vulnerable to path traversal attacks.
A specially crafted Debian source package can lead to file modification
outside of the destination directory when extracting the package content.


For the stable distribution (lenny), this problem has been fixed in
version 1.14.29.

For the testing (squeeze) and unstable (sid) distribution this problem
will be fixed soon.

We recommend that you upgrade your dpkg packages.

Upgrade instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 5.0 alias lenny
- --------------------------------

Debian (stable)
- ---------------

Stable updates are available for alpha, amd64, arm, armel, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.

Source archives:

  http://security.debian.org/pool/updates/main/d/dpkg/dpkg_1.14.29.dsc
    Size/MD5 checksum:     1544 7cf187bdb138606465a626f30da65423
  http://security.debian.org/pool/updates/main/d/dpkg/dpkg_1.14.29.tar.gz
    Size/MD5 checksum:  6849885 4326172a959b5b6484b4bc126e9f628d

Architecture independent packages:

  http://security.debian.org/pool/updates/main/d/dpkg/dpkg-dev_1.14.29_all.deb
    Size/MD5 checksum:   770984 76f021d6ddbbd0726f123cc993f55b40

alpha architecture (DEC Alpha)

  http://security.debian.org/pool/updates/main/d/dpkg/dpkg_1.14.29_alpha.deb
    Size/MD5 checksum:  2446040 96fe37e062b47c64faf2e16463265d15
  http://security.debian.org/pool/updates/main/d/dpkg/dselect_1.14.29_alpha.deb
    Size/MD5 checksum:   814066 bc68e19e69ec46a769780a68fef862a8

amd64 architecture (AMD x86_64 (AMD64))

  http://security.debian.org/pool/updates/main/d/dpkg/dpkg_1.14.29_amd64.deb
    Size/MD5 checksum:  2400244 0e38c74c3fd8cd11d3112b950e1fd42a
  http://security.debian.org/pool/updates/main/d/dpkg/dselect_1.14.29_amd64.deb
    Size/MD5 checksum:   800106 6e1ef50a9e0821d4087ffd22aa71d031

arm architecture (ARM)

  http://security.debian.org/pool/updates/main/d/dpkg/dpkg_1.14.29_arm.deb
    Size/MD5 checksum:  2364912 308e279965adbc2d10a1131978b71fc1
  http://security.debian.org/pool/updates/main/d/dpkg/dselect_1.14.29_arm.deb
    Size/MD5 checksum:   798628 d891c19e779426db56070820c52ed52e

armel architecture (ARM EABI)

  http://security.debian.org/pool/updates/main/d/dpkg/dselect_1.14.29_armel.deb
    Size/MD5 checksum:   797176 3ade9a406bb32f8e82205d78572c6f6a
  http://security.debian.org/pool/updates/main/d/dpkg/dpkg_1.14.29_armel.deb
    Size/MD5 checksum:  2361596 6e781e9051ecb40ae4b3dc89226d5f60

hppa architecture (HP PA RISC)

  http://security.debian.org/pool/updates/main/d/dpkg/dpkg_1.14.29_hppa.deb
    Size/MD5 checksum:  2414914 dea419be797918c210c7f2ea81b968a2
  http://security.debian.org/pool/updates/main/d/dpkg/dselect_1.14.29_hppa.deb
    Size/MD5 checksum:   812730 1b7ad0f69ef081f68c50df9023581d6f

i386 architecture (Intel ia32)

  http://security.debian.org/pool/updates/main/d/dpkg/dselect_1.14.29_i386.deb
    Size/MD5 checksum:   800424 66ebb60ebc836702afbe8cae59a39f35
  http://security.debian.org/pool/updates/main/d/dpkg/dpkg_1.14.29_i386.deb
    Size/MD5 checksum:  2354472 d81c926899c940f03190ea74bfbecb7f

ia64 architecture (Intel ia64)

  http://security.debian.org/pool/updates/main/d/dpkg/dpkg_1.14.29_ia64.deb
    Size/MD5 checksum:  2606008 72fc1c9a4081e5d90bb1f7735b334f2b
  http://security.debian.org/pool/updates/main/d/dpkg/dselect_1.14.29_ia64.deb
    Size/MD5 checksum:   842398 3ae67b486742d05ab49fe82c5d56521f

mips architecture (MIPS (Big Endian))

  http://security.debian.org/pool/updates/main/d/dpkg/dpkg_1.14.29_mips.deb
    Size/MD5 checksum:  2406768 78bd15417766928cc79d1950b02a0fac
  http://security.debian.org/pool/updates/main/d/dpkg/dselect_1.14.29_mips.deb
    Size/MD5 checksum:   809606 a897741ac7876f70f9e69477eab3fe12

mipsel architecture (MIPS (Little Endian))

  http://security.debian.org/pool/updates/main/d/dpkg/dselect_1.14.29_mipsel.deb
    Size/MD5 checksum:   811048 85bc3ad6ef312571f1e707f7b6136fd3
  http://security.debian.org/pool/updates/main/d/dpkg/dpkg_1.14.29_mipsel.deb
    Size/MD5 checksum:  2402126 4ac9b517d9a39e37d05f0efdc131b93f

powerpc architecture (PowerPC)

  http://security.debian.org/pool/updates/main/d/dpkg/dpkg_1.14.29_powerpc.deb
    Size/MD5 checksum:  2398050 3b98a0fe1f17e38905d189676fec7246
  http://security.debian.org/pool/updates/main/d/dpkg/dselect_1.14.29_powerpc.deb
    Size/MD5 checksum:   808874 88e02c80992df57289ce52b5cc032c3d

s390 architecture (IBM S/390)

  http://security.debian.org/pool/updates/main/d/dpkg/dpkg_1.14.29_s390.deb
    Size/MD5 checksum:  2409406 7ca42e53f5a74e7381307fd5ca19b7a8
  http://security.debian.org/pool/updates/main/d/dpkg/dselect_1.14.29_s390.deb
    Size/MD5 checksum:   800334 161afe75a681ff023995bc5764e49947

sparc architecture (Sun SPARC/UltraSPARC)

  http://security.debian.org/pool/updates/main/d/dpkg/dpkg_1.14.29_sparc.deb
    Size/MD5 checksum:  2357888 2e1be7c5b81f5c9e66946396922b40ff
  http://security.debian.org/pool/updates/main/d/dpkg/dselect_1.14.29_sparc.deb
    Size/MD5 checksum:   798754 4709cd55f7f47a5fe2e82df17c019821


  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@...ts.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)

iEYEARECAAYFAkuYBasACgkQHYflSXNkfP+sVACfU0jETaPVlC8d5DaywaxXJ3k0
yxYAnjDM0XUFKMfF+8skcAMofXav4B/L
=8hIj
-----END PGP SIGNATURE-----

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ