Debian: 'nano' vulnerability

    Date 16 Dec 2000
    3204
    Posted By LinuxSecurity Advisories
    When nano (a free pico clone) unexpectedly diesit tries a warning message to a new file with a predictable name.
    
    - ------------------------------------------------------------------------
    Debian Security Advisory DSA-004-1                   This email address is being protected from spambots. You need JavaScript enabled to view it. 
    https://www.debian.org/security/                         Wichert Akkerman
    December 17, 2000
    - ------------------------------------------------------------------------
    
    
    Package        : nano
    Problem type   : symlink attack
    Debian-specific: no
    
    The problem that was previously reported for joe also occurs with
    other editors. When nano (a free pico clone) unexpectedly dies
    it tries a warning message to a new file with a predictable name
    (the name of the file being edited with ".save" appended). Unfortunately
    that file was not created safely which made nano vulnerable to a
    symlink attack.
    
    This has been fixed in version 0.9.23-1 (except for powerpc, which has
    version 0.9.23-1.1).
    
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    
    
    Debian GNU/Linux 2.2 alias potato
    - ---------------------------------
    
      Potato was released for alpha, arm, i386, m68k, powerpc and sparc.
    
      Source archives:
         https://security.debian.org/dists/stable/updates/main/source/nano_0.9.23-1.diff.gz
          MD5 checksum: 5c878e43e5161ee25043f60886c88b03
         https://security.debian.org/dists/stable/updates/main/source/nano_0.9.23-1.dsc
          MD5 checksum: 85879b609fbcd5b091e686d16e75865b
         https://security.debian.org/dists/stable/updates/main/source/nano_0.9.23.orig.tar.gz
          MD5 checksum: 56bdf48e0d56b83ca669ec813cc0d466
    
      Alpha architecture:
         https://security.debian.org/dists/stable/updates/main/binary-alpha/nano-tiny_0.9.23-1_alpha.deb
          MD5 checksum: f7bba57357225edc934d5adb1ef2259e
         https://security.debian.org/dists/stable/updates/main/binary-alpha/nano_0.9.23-1_alpha.deb
          MD5 checksum: c6a99a014225016f86f367a4ec0edf8b
    
      ARM architecture:
         https://security.debian.org/dists/stable/updates/main/binary-arm/nano-tiny_0.9.23-1_arm.deb
          MD5 checksum: 4a3e6f9140e874bc502149b610007307
         https://security.debian.org/dists/stable/updates/main/binary-arm/nano_0.9.23-1_arm.deb
          MD5 checksum: 111c0a9180e07868cb471c47cace287e
    
      Intel ia32 architecture:
         https://security.debian.org/dists/stable/updates/main/binary-i386/nano-tiny_0.9.23-1_i386.deb
          MD5 checksum: fd018ffdb6bf1932b96473969bcf9ef9
         https://security.debian.org/dists/stable/updates/main/binary-i386/nano_0.9.23-1_i386.deb
          MD5 checksum: ce7487c7aa0ce8ed1b791f51b5ece31c
    
      Motorola 680x0 architecture:
         https://security.debian.org/dists/stable/updates/main/binary-m68k/nano-tiny_0.9.23-1_m68k.deb
          MD5 checksum: 49261ca3f044d318dda67069527d4260
         https://security.debian.org/dists/stable/updates/main/binary-m68k/nano_0.9.23-1_m68k.deb
          MD5 checksum: 0a0ac605a31e49674ceb0d3b5d3aa0a8
    
      PowerPC architecture:
         https://security.debian.org/dists/stable/updates/main/binary-powerpc/nano-tiny_0.9.23-1.1_powerpc.deb
          MD5 checksum: c6d4ec4efd2853f4acd35a4ec5e951c8
         https://security.debian.org/dists/stable/updates/main/binary-powerpc/nano_0.9.23-1.1_powerpc.deb
          MD5 checksum: 69df7777cedcc4aba0134a4838614aca
    
      Sun Sparc architecture:
         https://security.debian.org/dists/stable/updates/main/binary-sparc/nano-tiny_0.9.23-1_sparc.deb
          MD5 checksum: 912ba97af630e91e2878190d373ab375
         https://security.debian.org/dists/stable/updates/main/binary-sparc/nano_0.9.23-1_sparc.deb
          MD5 checksum: 6098621e245ed89c4b09772601c957e0
    
      These files will be moved into
       ftp://ftp.debian.org/debian/dists/stable/*/binary-$arch/ soon.
    
    For not yet released architectures please refer to the appropriate
    directory  ftp://ftp.debian.org/debian/dists/sid/binary-$arch/ .
    
    
    
    

    LinuxSecurity Poll

    Do you feel that the Lawful Access to Encrypted Data Act, which aims to force encryption backdoors, is a threat to US citizens' privacy?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/30-do-you-feel-that-the-lawful-access-to-encrypted-data-act-which-aims-to-force-encryption-backdoors-is-a-threat-to-privacy?task=poll.vote&format=json
    30
    radio
    [{"id":"106","title":"Yes - I am a privacy advocate and I am strongly opposed to this bill.","votes":"19","type":"x","order":"1","pct":95,"resources":[]},{"id":"107","title":"I'm undecided - it has its pros and cons.","votes":"1","type":"x","order":"2","pct":5,"resources":[]},{"id":"108","title":"No - I support this bill and feel that it will help protect against crime and threats to our national security. ","votes":"0","type":"x","order":"3","pct":0,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350
    bottom 200

    Advisories

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.