Debian: New snmptrapfmt packages fix insecure temporary file

    Date21 Mar 2006
    CategoryDebian
    5143
    Posted ByLinuxSecurity Advisories
    Updated package.
    - --------------------------------------------------------------------------
    Debian Security Advisory DSA 1013-1                    This email address is being protected from spambots. You need JavaScript enabled to view it.
    http://www.debian.org/security/                             Martin Schulze
    March 22nd, 2006                        http://www.debian.org/security/faq
    - --------------------------------------------------------------------------
    
    Package        : snmptrapfmt
    Vulnerability  : insecure temporary file
    Problem type   : local
    Debian-specific: no
    CVE ID         : CVE-2006-0050
    
    Will Aoki discovered that snmptrapfmt, a configurable snmp trap
    handler daemon for snmpd, does not prevent overwriting existing files
    when writing to a temporary log file.
    
    For the old stable distribution (woody) this problem has been fixed in
    version 1.03woody1.
    
    For the stable distribution (sarge) this problem has been fixed in
    version 1.08sarge1.
    
    For the unstable distribution (sid) this problem has been fixed in
    version 1.10-1.
    
    We recommend that you upgrade your snmptrapfmt package.
    
    
    Upgrade Instructions
    - --------------------
    
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    
    If you are using the apt-get package manager, use the line for
    sources.list as given below:
    
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    
    
    Debian GNU/Linux 3.0 alias woody
    - --------------------------------
    
      Source archives:
    
        http://security.debian.org/pool/updates/main/s/snmptrapfmt/snmptrapfmt_1.03woody1.dsc
          Size/MD5 checksum:      526 70bff136cf1671dba87b7c25b76b534c
        http://security.debian.org/pool/updates/main/s/snmptrapfmt/snmptrapfmt_1.03woody1.tar.gz
          Size/MD5 checksum:    16716 ac6bcf8eccfa4f71e0ef9ea14bdd4ef2
    
      Alpha architecture:
    
        http://security.debian.org/pool/updates/main/s/snmptrapfmt/snmptrapfmt_1.03woody1_alpha.deb
          Size/MD5 checksum:    20836 85e594b0cba3135205290f6e9c9e45d8
    
      ARM architecture:
    
        http://security.debian.org/pool/updates/main/s/snmptrapfmt/snmptrapfmt_1.03woody1_arm.deb
          Size/MD5 checksum:    15972 727d82a7bf68f33f058026608636179b
    
      Intel IA-32 architecture:
    
        http://security.debian.org/pool/updates/main/s/snmptrapfmt/snmptrapfmt_1.03woody1_i386.deb
          Size/MD5 checksum:    15828 51cc452a5a4a34adf3eee8bd0f1cc931
    
      Intel IA-64 architecture:
    
        http://security.debian.org/pool/updates/main/s/snmptrapfmt/snmptrapfmt_1.03woody1_ia64.deb
          Size/MD5 checksum:    23470 d88193f743bd931056ababfe186b406d
    
      HP Precision architecture:
    
        http://security.debian.org/pool/updates/main/s/snmptrapfmt/snmptrapfmt_1.03woody1_hppa.deb
          Size/MD5 checksum:    17876 eb4bfab080f1e01f8c1c424b37e86d2e
    
      Motorola 680x0 architecture:
    
        http://security.debian.org/pool/updates/main/s/snmptrapfmt/snmptrapfmt_1.03woody1_m68k.deb
          Size/MD5 checksum:    15300 e5bc6331255c4d367b21fa33484a24df
    
      Big endian MIPS architecture:
    
        http://security.debian.org/pool/updates/main/s/snmptrapfmt/snmptrapfmt_1.03woody1_mips.deb
          Size/MD5 checksum:    17414 706c890e463e40982115577d6366b38c
    
      Little endian MIPS architecture:
    
        http://security.debian.org/pool/updates/main/s/snmptrapfmt/snmptrapfmt_1.03woody1_mipsel.deb
          Size/MD5 checksum:    17396 4b9549de0525237b7960fcc3fb7a7e34
    
      PowerPC architecture:
    
        http://security.debian.org/pool/updates/main/s/snmptrapfmt/snmptrapfmt_1.03woody1_powerpc.deb
          Size/MD5 checksum:    17012 77a60b2618a0d6402b61505542def0c9
    
      IBM S/390 architecture:
    
        http://security.debian.org/pool/updates/main/s/snmptrapfmt/snmptrapfmt_1.03woody1_s390.deb
          Size/MD5 checksum:    16396 9c432c75e9ab8999f706cf5f44a3f912
    
      Sun Sparc architecture:
    
        http://security.debian.org/pool/updates/main/s/snmptrapfmt/snmptrapfmt_1.03woody1_sparc.deb
          Size/MD5 checksum:    20106 dba3eb8c1af9cd1cf4887b9f9f5dc919
    
    
    Debian GNU/Linux 3.1 alias sarge
    - --------------------------------
    
      Source archives:
    
        http://security.debian.org/pool/updates/main/s/snmptrapfmt/snmptrapfmt_1.08sarge1.dsc
          Size/MD5 checksum:      516 b50422f5221e403d2050c14b7c66ce61
        http://security.debian.org/pool/updates/main/s/snmptrapfmt/snmptrapfmt_1.08sarge1.tar.gz
          Size/MD5 checksum:    18028 4272e8d4477b04fe767e81bf42100ddb
    
      Alpha architecture:
    
        http://security.debian.org/pool/updates/main/s/snmptrapfmt/snmptrapfmt_1.08sarge1_alpha.deb
          Size/MD5 checksum:    20432 d6ac3ca520d385a287668f1052309ace
    
      AMD64 architecture:
    
        http://security.debian.org/pool/updates/main/s/snmptrapfmt/snmptrapfmt_1.08sarge1_amd64.deb
          Size/MD5 checksum:    18940 b1569bc7eb07473243c3cb8d3ae39b0d
    
      ARM architecture:
    
        http://security.debian.org/pool/updates/main/s/snmptrapfmt/snmptrapfmt_1.08sarge1_arm.deb
          Size/MD5 checksum:    17314 09efd328261c381c3d5820fd8694687f
    
      Intel IA-32 architecture:
    
        http://security.debian.org/pool/updates/main/s/snmptrapfmt/snmptrapfmt_1.08sarge1_i386.deb
          Size/MD5 checksum:    17556 297688542b5ebc69a90d65eefcf91bf1
    
      Intel IA-64 architecture:
    
        http://security.debian.org/pool/updates/main/s/snmptrapfmt/snmptrapfmt_1.08sarge1_ia64.deb
          Size/MD5 checksum:    23648 c09e71375846d03fcc055661a4fa5583
    
      HP Precision architecture:
    
        http://security.debian.org/pool/updates/main/s/snmptrapfmt/snmptrapfmt_1.08sarge1_hppa.deb
          Size/MD5 checksum:    19622 43dd8b83363eabc50db98b94c8997669
    
      Motorola 680x0 architecture:
    
        http://security.debian.org/pool/updates/main/s/snmptrapfmt/snmptrapfmt_1.08sarge1_m68k.deb
          Size/MD5 checksum:    16940 538ee49ec5f773667ec7dd673685fb2b
    
      Big endian MIPS architecture:
    
        http://security.debian.org/pool/updates/main/s/snmptrapfmt/snmptrapfmt_1.08sarge1_mips.deb
          Size/MD5 checksum:    20446 cd81b32736aed88be213a8b081b0c433
    
      Little endian MIPS architecture:
    
        http://security.debian.org/pool/updates/main/s/snmptrapfmt/snmptrapfmt_1.08sarge1_mipsel.deb
          Size/MD5 checksum:    20528 c1c92e310b4d39d22b5fd322741c9375
    
      PowerPC architecture:
    
        http://security.debian.org/pool/updates/main/s/snmptrapfmt/snmptrapfmt_1.08sarge1_powerpc.deb
          Size/MD5 checksum:    18244 e5ed9744340de79cab0f5b79638f0fbb
    
      IBM S/390 architecture:
    
        http://security.debian.org/pool/updates/main/s/snmptrapfmt/snmptrapfmt_1.08sarge1_s390.deb
          Size/MD5 checksum:    18436 be9b62e95c994b756200e868339d378e
    
      Sun Sparc architecture:
    
        http://security.debian.org/pool/updates/main/s/snmptrapfmt/snmptrapfmt_1.08sarge1_sparc.deb
          Size/MD5 checksum:    17450 d99f331ac8d556f359d45211a78cddf8
    
    
      These files will probably be moved into the stable distribution on
      its next update.
    
    - ---------------------------------------------------------------------------------
    For apt-get: deb http://security.debian.org/ stable/updates main
    For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"5","type":"x","order":"1","pct":62.5,"resources":[]},{"id":"88","title":"Should be more technical","votes":"2","type":"x","order":"2","pct":25,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"1","type":"x","order":"3","pct":12.5,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.