5873528 2000-12-16 17:43 -0800  /110 rader/  <debian-security-announce@LISTS.DEBIAN.ORG>
Sänt av: joel@lysator.liu.se
Importerad: 2000-12-19  02:04  av Brevbäraren (som är implementerad i) Python
Extern mottagare: BUGTRAQ@SECURITYFOCUS.COM
Externa svar till: security@debian.org
Mottagare: Bugtraq (import) <14290>
Ärende: [SECURITY] [DSA-004-1] nano symlink attack
------------------------------------------------------------
From: debian-security-announce@LISTS.DEBIAN.ORG
To: BUGTRAQ@SECURITYFOCUS.COM
Message-ID: <KE_e_.A.qvC.pYBP6@murphy>

-----BEGIN PGP SIGNED MESSAGE-----

- ------------------------------------------------------------------------
Debian Security Advisory DSA-004-1                   security@debian.org
http://www.debian.org/security/                         Wichert Akkerman
December 17, 2000
- ------------------------------------------------------------------------


Package        : nano
Problem type   : symlink attack
Debian-specific: no

The problem that was previously reported for joe also occurs with
other editors. When nano (a free pico clone) unexpectedly dies it
tries a warning message to a new file with a predictable name (the
name of the file being edited with ".save" appended). Unfortunately
that file was not created safely which made nano vulnerable to a
symlink attack.

This has been fixed in version 0.9.23-1 (except for powerpc, which has
version 0.9.23-1.1).

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.


Debian GNU/Linux 2.2 alias potato
- ---------------------------------

  Potato was released for alpha, arm, i386, m68k, powerpc and sparc.

  Source archives:
    http://security.debian.org/dists/stable/updates/main/source/nano_0.9.23-1.diff.gz
      MD5 checksum: 5c878e43e5161ee25043f60886c88b03
    http://security.debian.org/dists/stable/updates/main/source/nano_0.9.23-1.dsc
      MD5 checksum: 85879b609fbcd5b091e686d16e75865b
    http://security.debian.org/dists/stable/updates/main/source/nano_0.9.23.orig.tar.gz
      MD5 checksum: 56bdf48e0d56b83ca669ec813cc0d466

  Alpha architecture:
    http://security.debian.org/dists/stable/updates/main/binary-alpha/nano-tiny_0.9.23-1_alpha.deb
      MD5 checksum: f7bba57357225edc934d5adb1ef2259e
    http://security.debian.org/dists/stable/updates/main/binary-alpha/nano_0.9.23-1_alpha.deb
      MD5 checksum: c6a99a014225016f86f367a4ec0edf8b

  ARM architecture:
    http://security.debian.org/dists/stable/updates/main/binary-arm/nano-tiny_0.9.23-1_arm.deb
      MD5 checksum: 4a3e6f9140e874bc502149b610007307
    http://security.debian.org/dists/stable/updates/main/binary-arm/nano_0.9.23-1_arm.deb
      MD5 checksum: 111c0a9180e07868cb471c47cace287e

  Intel ia32 architecture:
    http://security.debian.org/dists/stable/updates/main/binary-i386/nano-tiny_0.9.23-1_i386.deb
      MD5 checksum: fd018ffdb6bf1932b96473969bcf9ef9
    http://security.debian.org/dists/stable/updates/main/binary-i386/nano_0.9.23-1_i386.deb
      MD5 checksum: ce7487c7aa0ce8ed1b791f51b5ece31c

  Motorola 680x0 architecture:
    http://security.debian.org/dists/stable/updates/main/binary-m68k/nano-tiny_0.9.23-1_m68k.deb
      MD5 checksum: 49261ca3f044d318dda67069527d4260
    http://security.debian.org/dists/stable/updates/main/binary-m68k/nano_0.9.23-1_m68k.deb
      MD5 checksum: 0a0ac605a31e49674ceb0d3b5d3aa0a8

  PowerPC architecture:
    http://security.debian.org/dists/stable/updates/main/binary-powerpc/nano-tiny_0.9.23-1.1_powerpc.deb
      MD5 checksum: c6d4ec4efd2853f4acd35a4ec5e951c8
    http://security.debian.org/dists/stable/updates/main/binary-powerpc/nano_0.9.23-1.1_powerpc.deb
      MD5 checksum: 69df7777cedcc4aba0134a4838614aca

  Sun Sparc architecture:
    http://security.debian.org/dists/stable/updates/main/binary-sparc/nano-tiny_0.9.23-1_sparc.deb
      MD5 checksum: 912ba97af630e91e2878190d373ab375
    http://security.debian.org/dists/stable/updates/main/binary-sparc/nano_0.9.23-1_sparc.deb
      MD5 checksum: 6098621e245ed89c4b09772601c957e0

  These files will be moved into
  ftp://ftp.debian.org/debian/dists/stable/*/binary-$arch/ soon.

For not yet released architectures please refer to the appropriate
directory ftp://ftp.debian.org/debian/dists/sid/binary-$arch/ .

- --
- ----------------------------------------------------------------------------
apt-get: deb http://security.debian.org/ stable/updates main
dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3ia
Charset: noconv

iQB1AwUBOjwRPqjZR/ntlUftAQH1iwL/bu120g7gHAsxFYJ4pl5lO937NedpaQvX
sX1JamVexYLNuiamV44iwRN9kiNTBaUNaSfDX8NeL0X/cUuCa6RX841mjeDcRy3j
ZaEafWvyC0qioxQhqwH3sHitRQviZlmB
=QgKa
-----END PGP SIGNATURE-----


-- To UNSUBSCRIBE, email to
debian-security-announce-request@lists.debian.org with a subject of
"unsubscribe". Trouble? Contact listmaster@lists.debian.org
(5873528) --------------------------------(Ombruten)