Debian: 'samba' vulnerability

    Date 09 May 2001
    2738
    Posted By LinuxSecurity Advisories
    Marc Jacobsen from HP discovered that the security fixes from samba 2.0.8 did not fully fix the /tmp symlink attack problem. The samba team released version 2.0.9 to fix that, and those fixes have been added to version 2.0.7-3.3 of the Debian samba packages.
    
    ------------------------------------------------------------------------
    Debian Security Advisory DSA-048-3                   This email address is being protected from spambots. You need JavaScript enabled to view it. 
    https://www.debian.org/security/                         Wichert Akkerman
    May  9, 2001
    ------------------------------------------------------------------------
    
    
    Package        : samba
    Problem type   : local symlink attack
    Debian-specific: no
    
    Marc Jacobsen from HP discovered that the security fixes from samba
    2.0.8 did not fully fix the /tmp symlink attack problem. The samba
    team released version 2.0.9 to fix that, and those fixes have been
    added to version 2.0.7-3.3 of the Debian samba packages.
    
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    
    
    Debian GNU/Linux 2.2 alias potato
    ---------------------------------
    
      Potato was released for alpha, arm, i386, m68k, powerpc and sparc.
    
      Source archives:
         https://security.debian.org/dists/stable/updates/main/source/samba_2.0.7-3.3.diff.gz
          MD5 checksum: fb25d2efdcf9827f9c9f350e202ed47b
         https://security.debian.org/dists/stable/updates/main/source/samba_2.0.7-3.3.dsc
          MD5 checksum: 7caa2f8b92500d4c2945ae3fbb51b30c
         https://security.debian.org/dists/stable/updates/main/source/samba_2.0.7.orig.tar.gz
          MD5 checksum: b5e61ea655d476072fd0365785fea2d0
    
      Architecture independent archives:
         https://security.debian.org/dists/stable/updates/main/binary-all/samba-doc_2.0.7-3.3_all.deb
          MD5 checksum: b7c93690b934ebbadbefd053eb1048e4
    
      Alpha architecture:
        
    https://security.debian.org/dists/stable/updates/main/binary-alpha/samba-common_2.0.7-3.3_alpha.deb
          MD5 checksum: 864aeb1e6c6a59b073881a5108af35c8
         https://security.debian.org/dists/stable/updates/main/binary-alpha/samba_2.0.7-3.3_alpha.deb
          MD5 checksum: 1baac8d043e7f209e8f84fa13c55c501
         https://security.debian.org/dists/stable/updates/main/binary-alpha/smbclient_2.0.7-3.3_alpha.deb
          MD5 checksum: 0a2a844ac6600d1bcdf678b4b2b5e9b9
         https://security.debian.org/dists/stable/updates/main/binary-alpha/smbfs_2.0.7-3.3_alpha.deb
          MD5 checksum: 070ddebfae51595ea509a6b091305695
         https://security.debian.org/dists/stable/updates/main/binary-alpha/swat_2.0.7-3.3_alpha.deb
          MD5 checksum: 740ec8bd816bedabcae5e1e2ddbadec9
    
      ARM architecture:
         https://security.debian.org/dists/stable/updates/main/binary-arm/samba-common_2.0.7-3.3_arm.deb
          MD5 checksum: 544791b3a9c3ef845ef5a9ad13669590
         https://security.debian.org/dists/stable/updates/main/binary-arm/samba_2.0.7-3.3_arm.deb
          MD5 checksum: 118fcd9580ce00b036643aecb73102eb
         https://security.debian.org/dists/stable/updates/main/binary-arm/smbclient_2.0.7-3.3_arm.deb
          MD5 checksum: b855eb4222737fbc852a9b3223afff80
         https://security.debian.org/dists/stable/updates/main/binary-arm/smbfs_2.0.7-3.3_arm.deb
          MD5 checksum: e18e1ed74f204be62d9f9e144976808d
         https://security.debian.org/dists/stable/updates/main/binary-arm/swat_2.0.7-3.3_arm.deb
          MD5 checksum: 78cebbf5ee2b72cb067cca950230c0ac
    
      Intel IA-32 architecture:
        
    https://security.debian.org/dists/stable/updates/main/binary-i386/samba-common_2.0.7-3.3_i386.deb
          MD5 checksum: 866f8c588ce6724dfc5e88d3a834c16d
         https://security.debian.org/dists/stable/updates/main/binary-i386/samba_2.0.7-3.3_i386.deb
          MD5 checksum: b9f55e1d8720da82f2773590267ae22b
         https://security.debian.org/dists/stable/updates/main/binary-i386/smbclient_2.0.7-3.3_i386.deb
          MD5 checksum: a3f4d744c71cbadf2479f0cda579b519
         https://security.debian.org/dists/stable/updates/main/binary-i386/smbfs_2.0.7-3.3_i386.deb
          MD5 checksum: 68afbd272d229338d8b5abef5a7447b1
         https://security.debian.org/dists/stable/updates/main/binary-i386/swat_2.0.7-3.3_i386.deb
          MD5 checksum: 8d8ab8c4bf21f09da1dd5c8472b2b0b2
    
      Motorola 680x0 architecture:
        
    https://security.debian.org/dists/stable/updates/main/binary-m68k/samba-common_2.0.7-3.3_m68k.deb
          MD5 checksum: 721bb1eeb7a6a9ac040a483552e246c3
         https://security.debian.org/dists/stable/updates/main/binary-m68k/samba_2.0.7-3.3_m68k.deb
          MD5 checksum: 8d03030849cc8499ed725201921cf0f9
         https://security.debian.org/dists/stable/updates/main/binary-m68k/smbclient_2.0.7-3.3_m68k.deb
          MD5 checksum: 294f6e1bc6eb452f22b0ce38d987af63
         https://security.debian.org/dists/stable/updates/main/binary-m68k/smbfs_2.0.7-3.3_m68k.deb
          MD5 checksum: 13c067bebf1c691a069461b3d5974acc
         https://security.debian.org/dists/stable/updates/main/binary-m68k/swat_2.0.7-3.3_m68k.deb
          MD5 checksum: 85923bbf62e5197fa8e97d20d9fd867b
    
      PowerPC architecture:
        
    https://security.debian.org/dists/stable/updates/main/binary-powerpc/samba-common_2.0.7-3.3_powerpc.d
    eb
          MD5 checksum: df8ff7ab53a51b28667688a49a4c2b0e
         https://security.debian.org/dists/stable/updates/main/binary-powerpc/samba_2.0.7-3.3_powerpc.deb
          MD5 checksum: 0f356868a9a51c4ee29f552bec6d4ac2
        
    https://security.debian.org/dists/stable/updates/main/binary-powerpc/smbclient_2.0.7-3.3_powerpc.deb
          MD5 checksum: e468fdfabea28f5243556d0e083bafd3
         https://security.debian.org/dists/stable/updates/main/binary-powerpc/smbfs_2.0.7-3.3_powerpc.deb
          MD5 checksum: 3f39802e251843d685e5573d5aab96f5
         https://security.debian.org/dists/stable/updates/main/binary-powerpc/swat_2.0.7-3.3_powerpc.deb
          MD5 checksum: 31ffe9987d2c9b8097599c2b97dfbe6f
    
      Sun Sparc architecture:
        
    https://security.debian.org/dists/stable/updates/main/binary-sparc/samba-common_2.0.7-3.3_sparc.deb
          MD5 checksum: 71873cfcc6ab3f72ed3fc3c1f5d03ab6
         https://security.debian.org/dists/stable/updates/main/binary-sparc/samba_2.0.7-3.3_sparc.deb
          MD5 checksum: 2bdc4bf4d61d47ff0f466ec897b540f1
         https://security.debian.org/dists/stable/updates/main/binary-sparc/smbclient_2.0.7-3.3_sparc.deb
          MD5 checksum: 1168af2009fa68ceb7d30fc204d59ae1
         https://security.debian.org/dists/stable/updates/main/binary-sparc/smbfs_2.0.7-3.3_sparc.deb
          MD5 checksum: cbff6ec394d64078840f41e6b163e015
         https://security.debian.org/dists/stable/updates/main/binary-sparc/swat_2.0.7-3.3_sparc.deb
          MD5 checksum: 14d0696198b0bb6c569314c6899ce7c3
    
      These packages will be moved into the stable distribution on its next
      revision.
    
    For not yet released architectures please refer to the appropriate
    directory  ftp://ftp.debian.org/debian/dists/sid/binary-$arch/ .
    
    --
    ----------------------------------------------------------------------------
    apt-get: deb  https://security.debian.org/ stable/updates main
    dpkg-ftp:  ftp://security.debian.org/debian-security dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    
    
    

    LinuxSecurity Poll

    How do you feel about the elimination of the terms 'blacklist' and 'slave' from the Linux kernel?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/32-how-do-you-feel-about-the-elimination-of-the-terms-blacklist-and-slave-from-the-linux-kernel?task=poll.vote&format=json
    32
    radio
    [{"id":"112","title":"I strongly support this change - racially charged language should not be used in the code and documentation of the kernel and other open-source projects.","votes":"6","type":"x","order":"1","pct":18.75,"resources":[]},{"id":"113","title":"I'm indifferent - this small change will not affect broader issues of racial insensitivity and white privilege.","votes":"4","type":"x","order":"2","pct":12.5,"resources":[]},{"id":"114","title":"I'm opposed to this change - there is no need to change language that has been used for years. It doesn't make sense for people to take offense to terminology used in community projects.","votes":"22","type":"x","order":"3","pct":68.75,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350
    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.