Linux Security
    Linux Security
    Linux Security

    Debian: New gsambad packages fix unsafe temporary files

    Date
    3696
    Posted By
    Steve Kemp from the Debian Security Audit project discovered that gsambad, a GTK+ configuration tool for samba, uses temporary files in an unsafe manner which may be exploited to truncate arbitary files from the local system.
    - ------------------------------------------------------------------------
    Debian Security Advisory DSA-1327                    This email address is being protected from spambots. You need JavaScript enabled to view it.
    https://www.debian.org/security/                               Steve Kemp
    July 01, 2007
    - ------------------------------------------------------------------------
    
    Package        : gsambad
    Vulnerability  : insecurity temporary files
    Problem type   : local
    Debian-specific: no
    CVE Id(s)      : CVE-2007-2838
    
    
    Steve Kemp from the Debian Security Audit project discovered that gsambad,
    a GTK+ configuration tool for samba, uses temporary files in an unsafe
    manner which may be exploited to truncate arbitary files from the local
    system.
    
    For the stable distribution (etch) this problem has been fixed in
    version 0.1.4-2etch1.
    
    For the unstable distribution (sid) this problem will be fixed shortly.
    
    We recommend that you upgrade your gsambad package.
    
    
    Upgrade instructions
    - --------------------
    
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    
    If you are using the apt-get package manager, use the line for
    sources.list as given below:
    
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    
    
    
    Debian GNU/Linux 4.0 alias etch
    - -------------------------------
    
    Stable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.
    
    Source archives:
    
      https://security.debian.org/pool/updates/main/g/gsambad/gsambad_0.1.4-2etch1.diff.gz
        Size/MD5 checksum:    24766 8ac63c3ecf53c7243f6f8675d3e2bb48
      https://security.debian.org/pool/updates/main/g/gsambad/gsambad_0.1.4-2etch1.dsc
        Size/MD5 checksum:      609 35dc69c7f48b6b327b782d310037eac6
      https://security.debian.org/pool/updates/main/g/gsambad/gsambad_0.1.4.orig.tar.gz
        Size/MD5 checksum:   385776 ced255218e024b43de6d42c9fc1653d2
    
    alpha architecture (DEC Alpha)
    
      https://security.debian.org/pool/updates/main/g/gsambad/gsambad_0.1.4-2etch1_alpha.deb
        Size/MD5 checksum:   109878 5aadc8c608d516df18c4bffb0cee70a9
    
    amd64 architecture (AMD x86_64 (AMD64))
    
      https://security.debian.org/pool/updates/main/g/gsambad/gsambad_0.1.4-2etch1_amd64.deb
        Size/MD5 checksum:    92416 9f332e4530c72917193402535c9f83e4
    
    arm architecture (ARM)
    
      https://security.debian.org/pool/updates/main/g/gsambad/gsambad_0.1.4-2etch1_arm.deb
        Size/MD5 checksum:    88570 7f540eb27987fe1d8130279f1a3f41e1
    
    i386 architecture (Intel ia32)
    
      https://security.debian.org/pool/updates/main/g/gsambad/gsambad_0.1.4-2etch1_i386.deb
        Size/MD5 checksum:    93918 4f47a220caba72b7daadf205545dd214
    
    ia64 architecture (Intel ia64)
    
      https://security.debian.org/pool/updates/main/g/gsambad/gsambad_0.1.4-2etch1_ia64.deb
        Size/MD5 checksum:   120170 68f5483b3c10a787b7d8c6f3a7a39a34
    
    mipsel architecture (MIPS (Little Endian))
    
      https://security.debian.org/pool/updates/main/g/gsambad/gsambad_0.1.4-2etch1_mipsel.deb
        Size/MD5 checksum:    87426 7f4408ddd5cb502067dcea364344cfe8
    
    powerpc architecture (PowerPC)
    
      https://security.debian.org/pool/updates/main/g/gsambad/gsambad_0.1.4-2etch1_powerpc.deb
        Size/MD5 checksum:    92822 4995be1a528256e86bb254dee1b0cc0f
    
    s390 architecture (IBM S/390)
    
      https://security.debian.org/pool/updates/main/g/gsambad/gsambad_0.1.4-2etch1_s390.deb
        Size/MD5 checksum:    85148 8ad37130b346472026e0171d09036729
    
    sparc architecture (Sun SPARC/UltraSPARC)
    
      https://security.debian.org/pool/updates/main/g/gsambad/gsambad_0.1.4-2etch1_sparc.deb
        Size/MD5 checksum:    87174 b4a354e57e38c7dcaad14bff8a183975
    
    
      These files will probably be moved into the stable distribution on
      its next update.
    
    - ---------------------------------------------------------------------------------
    For apt-get: deb https://security.debian.org/ stable/updates main
    For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    

    LinuxSecurity Poll

    Which statement best describes how you feel about the recent Linux 5.9 release?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 2 answer(s).
    /main-polls/40-what-change-are-you-most-excited-about-in-linux-5-9?task=poll.vote&format=json
    40
    radio
    [{"id":"140","title":"Not a game-changer for me.","votes":"0","type":"x","order":"1","pct":0,"resources":[]},{"id":"141","title":"I'm happy with the performance improvements it offers.","votes":"4","type":"x","order":"2","pct":100,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350


    VIEW MORE POLLS

    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.