Debian: New gsambad packages fix unsafe temporary files

    Date01 Jul 2007
    CategoryDebian
    3522
    Posted ByLinuxSecurity Advisories
    Steve Kemp from the Debian Security Audit project discovered that gsambad, a GTK+ configuration tool for samba, uses temporary files in an unsafe manner which may be exploited to truncate arbitary files from the local system.
    - ------------------------------------------------------------------------
    Debian Security Advisory DSA-1327                    This email address is being protected from spambots. You need JavaScript enabled to view it.
    http://www.debian.org/security/                               Steve Kemp
    July 01, 2007
    - ------------------------------------------------------------------------
    
    Package        : gsambad
    Vulnerability  : insecurity temporary files
    Problem type   : local
    Debian-specific: no
    CVE Id(s)      : CVE-2007-2838
    
    
    Steve Kemp from the Debian Security Audit project discovered that gsambad,
    a GTK+ configuration tool for samba, uses temporary files in an unsafe
    manner which may be exploited to truncate arbitary files from the local
    system.
    
    For the stable distribution (etch) this problem has been fixed in
    version 0.1.4-2etch1.
    
    For the unstable distribution (sid) this problem will be fixed shortly.
    
    We recommend that you upgrade your gsambad package.
    
    
    Upgrade instructions
    - --------------------
    
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    
    If you are using the apt-get package manager, use the line for
    sources.list as given below:
    
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    
    
    
    Debian GNU/Linux 4.0 alias etch
    - -------------------------------
    
    Stable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.
    
    Source archives:
    
      http://security.debian.org/pool/updates/main/g/gsambad/gsambad_0.1.4-2etch1.diff.gz
        Size/MD5 checksum:    24766 8ac63c3ecf53c7243f6f8675d3e2bb48
      http://security.debian.org/pool/updates/main/g/gsambad/gsambad_0.1.4-2etch1.dsc
        Size/MD5 checksum:      609 35dc69c7f48b6b327b782d310037eac6
      http://security.debian.org/pool/updates/main/g/gsambad/gsambad_0.1.4.orig.tar.gz
        Size/MD5 checksum:   385776 ced255218e024b43de6d42c9fc1653d2
    
    alpha architecture (DEC Alpha)
    
      http://security.debian.org/pool/updates/main/g/gsambad/gsambad_0.1.4-2etch1_alpha.deb
        Size/MD5 checksum:   109878 5aadc8c608d516df18c4bffb0cee70a9
    
    amd64 architecture (AMD x86_64 (AMD64))
    
      http://security.debian.org/pool/updates/main/g/gsambad/gsambad_0.1.4-2etch1_amd64.deb
        Size/MD5 checksum:    92416 9f332e4530c72917193402535c9f83e4
    
    arm architecture (ARM)
    
      http://security.debian.org/pool/updates/main/g/gsambad/gsambad_0.1.4-2etch1_arm.deb
        Size/MD5 checksum:    88570 7f540eb27987fe1d8130279f1a3f41e1
    
    i386 architecture (Intel ia32)
    
      http://security.debian.org/pool/updates/main/g/gsambad/gsambad_0.1.4-2etch1_i386.deb
        Size/MD5 checksum:    93918 4f47a220caba72b7daadf205545dd214
    
    ia64 architecture (Intel ia64)
    
      http://security.debian.org/pool/updates/main/g/gsambad/gsambad_0.1.4-2etch1_ia64.deb
        Size/MD5 checksum:   120170 68f5483b3c10a787b7d8c6f3a7a39a34
    
    mipsel architecture (MIPS (Little Endian))
    
      http://security.debian.org/pool/updates/main/g/gsambad/gsambad_0.1.4-2etch1_mipsel.deb
        Size/MD5 checksum:    87426 7f4408ddd5cb502067dcea364344cfe8
    
    powerpc architecture (PowerPC)
    
      http://security.debian.org/pool/updates/main/g/gsambad/gsambad_0.1.4-2etch1_powerpc.deb
        Size/MD5 checksum:    92822 4995be1a528256e86bb254dee1b0cc0f
    
    s390 architecture (IBM S/390)
    
      http://security.debian.org/pool/updates/main/g/gsambad/gsambad_0.1.4-2etch1_s390.deb
        Size/MD5 checksum:    85148 8ad37130b346472026e0171d09036729
    
    sparc architecture (Sun SPARC/UltraSPARC)
    
      http://security.debian.org/pool/updates/main/g/gsambad/gsambad_0.1.4-2etch1_sparc.deb
        Size/MD5 checksum:    87174 b4a354e57e38c7dcaad14bff8a183975
    
    
      These files will probably be moved into the stable distribution on
      its next update.
    
    - ---------------------------------------------------------------------------------
    For apt-get: deb http://security.debian.org/ stable/updates main
    For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    
    You are not authorised to post comments.

    Comments powered by CComment

    Advisories

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"64","type":"x","order":"1","pct":57.14,"resources":[]},{"id":"88","title":"Should be more technical","votes":"15","type":"x","order":"2","pct":13.39,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"33","type":"x","order":"3","pct":29.46,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.