Debian: New cfengine packages fix arbitrary file overwriting
Summary
- --------------------------------------------------------------------------Debian Security Advisory DSA 835-1 security@debian.org http://www.debian.org/security/ Martin Schulze October 1st, 2005 http://www.debian.org/security/faq - --------------------------------------------------------------------------Package : cfengine Vulnerability : insecure temporary files Problem type : local Debian-specific: no CVE ID : CAN-2005-2960 Javier Fernández-Sanguino Peña discovered several insecure temporary file uses in cfengine, a tool for configuring and maintaining networked machines, that can be exploited by a symlink attack to overwrite arbitrary files owned by the user executing cfengine, which is probably root. For the old stable distribution (woody) these problems have been fixed in version 1.6.3-9woody1. For the stable distribution (sarge) these problems have been fixed in version 1.6.5-1sarge1. For the unstable distribution (sid) these problems have will be fixed soon. We recommend that you upgrade your cfengine package. Upgrade Instructions - --------------------wget url will fetch the file for you dpkg -i file.deb will install the referenced file. If you are using the apt-get package manager, use the line for sources.list as given below: apt-get update will update the internal database apt-get upgrade will install corrected packages You may use an automated update by adding the resources from the footer to the proper configuration. Debian GNU/Linux 3.0 alias woody - -------------------------------- Source archives: Size/MD5 checksum: 697 bb2e5be7b89c57f6c4cf1e3738ecd922 Size/MD5 checksum: 38077 1ae76d1eb77ebd60a3333c062a1a7c31 Size/MD5 checksum: 867415 19079eafbee44e3d39308c086d4b539b Architecture independent components: Size/MD5 checksum: 355562 ca9a13fab7548459c6084dc69d426aec Alpha architecture: Size/MD5 checksum: 405720 7b6364578e2eba666365e77e32507c4b ARM architecture: Size/MD5 checksum: 339210 aa977174967f661d2f212f3433bf6788 Intel IA-32 architecture: Size/MD5 checksum: 303270 a64338d36f68b7935cfc5989c850cd5e Intel IA-64 architecture: Size/MD5 checksum: 493172 41bcf6762cf4837c8709be21cff9eb7f HP Precision architecture: Size/MD5 checksum: 386724 e9442e863083edcb1e487a6c5fe93352 Motorola 680x0 architecture: Size/MD5 checksum: 281060 d948916061d5e8efb533e3b77b77a0ab Big endian MIPS architecture: Size/MD5 checksum: 363318 0bc37a72bb1f08f35a2b579484ffb573 Little endian MIPS architecture: Size/MD5 checksum: 361536 c2b6aa55d276d9b6ac74e78b8117f58c PowerPC architecture: Size/MD5 checksum: 340640 d54511ed3ad4994ae81fa8f5d94bddd2 IBM S/390 architecture: Size/MD5 checksum: 320202 4bfb085818e449b6a6a294d842fd93ce Sun Sparc architecture: Size/MD5 checksum: 348898 1a5bee66a3136dd0c7c81e389ea6d02c Debian GNU/Linux 3.1 alias sarge - -------------------------------- Source archives: Size/MD5 checksum: 688 0c5710c1edf3c6fdd6823d6db891d299 Size/MD5 checksum: 102832 8a282e6d4dde8c710e02a544967c5fe6 Size/MD5 checksum: 880066 fc02d8d56433f32020c3030192cad66e Architecture independent components: Size/MD5 checksum: 385994 1081dd615fdd1cd5682599b5253936ba Alpha architecture: Size/MD5 checksum: 420810 2402bacaa76d7763c27589c85a399605 AMD64 architecture: Size/MD5 checksum: 353842 953d1eb46f2cce0aedfb78e5f988cc53 ARM architecture: Size/MD5 checksum: 340160 83ed417663d90df0727a6a8c2606d11b Intel IA-32 architecture: Size/MD5 checksum: 323384 18459b30d0c2c5044e6922abde4425ea Intel IA-64 architecture: Size/MD5 checksum: 488116 f7a1c07bf59ba6163a82fed6a27666c1 HP Precision architecture: Size/MD5 checksum: 373982 778d47c9a7bba6a52c34580e2885a4f0 Motorola 680x0 architecture: Size/MD5 checksum: 289354 a8c67ffa26a9453959be270dd6109a36 Big endian MIPS architecture: Size/MD5 checksum: 366596 5978436e06a6fb7ad82d7f9860d02614 Little endian MIPS architecture: Size/MD5 checksum: 365032 4914663ccd6d58abfac5ae149c2b75cb PowerPC architecture: Size/MD5 checksum: 356614 a98b9bb1a97577472f350ae0f22bf37f IBM S/390 architecture: Size/MD5 checksum: 346324 33ac8dfdaa2fcb7ddccf258f901b8531 Sun Sparc architecture: Size/MD5 checksum: 338540 21169b41e6976910873d642a7acef495 These files will probably be moved into the stable distribution on its next update. - ---------------------------------------------------------------------------------For apt-get: deb http://security.debian.org/ stable/updates main For dpkg-ftp: dists/stable/updates/main Mailing list: debian-security-announce@lists.debian.org
Sign up to get the latest security news affecting Linux and
open source delivered straight to your inbox
Powered By
Linux Security - Your source for Top Linux News, Advisories, HowTo's and Feature Release.