4757150 2000-02-02 19:37 /92 rader/ Postmaster Mottagare: Bugtraq (import) <9597> Ärende: [Debian] New version of apcd released ------------------------------------------------------------ Approved-By: aleph1@SECURITYFOCUS.COM Delivered-To: bugtraq@lists.securityfocus.com Delivered-To: bugtraq@securityfocus.com Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Message-ID: <20000202101251.A11317@underground.org> Date: Wed, 2 Feb 2000 10:12:51 -0800 Reply-To: Aleph One <aleph1@UNDERGROUND.ORG> Sender: Bugtraq List <BUGTRAQ@SECURITYFOCUS.COM> From: Aleph One <aleph1@UNDERGROUND.ORG> X-To: bugtraq@securityfocus.com To: BUGTRAQ@SECURITYFOCUS.COM -----BEGIN PGP SIGNED MESSAGE----- - ------------------------------------------------------------------------ Debian Security Advisory security@debian.org http://www.debian.org/security/ Wichert Akkerman February 1, 2000 - ------------------------------------------------------------------------ Package: apcd Vulnerability type: symlink attack Debian-specific: no The apcd package as shipped in Debian GNU/Linux 2.1 is vulnerable to a symlink attack. If the apcd process gets a SIGUSR1 signal it will dump its status to /tmp/upsstat. However this file is not opened safely, which makes it a good target for a symlink attack. This has been fixed in version 0.6a.nr-4slink1. We recommend you upgrade your apcd package immediately. wget url will fetch the file for you dpkg -i file.deb will install the referenced file. Debian GNU/Linux 2.1 alias slink - -------------------------------- This version of Debian was released only for Intel ia32, the Motorola 680x0, the alpha and the Sun sparc architecture. Source archives: http://security.debian.org/dists/stable/updates/source/apcd_0.6a.nr-4slink1.diff.gz MD5 checksum: 418d34e54e080c2129b8a686e8423d6d http://security.debian.org/dists/stable/updates/source/apcd_0.6a.nr-4slink1.dsc MD5 checksum: f9be18f528e8a067696673337e1198ca http://security.debian.org/dists/stable/updates/source/apcd_0.6a.nr.orig.tar.gz MD5 checksum: 4a714a8de33cc482b678c0d21b26d76e Alpha architecture: http://security.debian.org/dists/stable/updates/binary-alpha/apcd_0.6a.nr-4slink1_alpha.deb MD5 checksum: 00210d5c30732f2bbaf68291f2d7e8d8 Intel ia32 architecture: http://security.debian.org/dists/stable/updates/binary-i386/apcd_0.6a.nr-4slink1_i386.deb MD5 checksum: cff51852635922507c37f96df99d8e76 Motorola 680x0 architecture: http://security.debian.org/dists/stable/updates/binary-m68k/apcd_0.6a.nr-4slink1_m68k.deb MD5 checksum: 827079cf5f0819653635873ded1f4a75 Sun Sparc architecture: http://security.debian.org/dists/stable/updates/binary-sparc/apcd_0.6a.nr-4slink1_sparc.deb MD5 checksum: d56b7b9ea14c4af81856dd3e1b480e92 These files will be moved into ftp://ftp.debian.org/debian/dists/stable/*/binary-$arch/ soon. For not yet released architectures please refer to the appropriate directory ftp://ftp.debian.org/debian/dists/sid/binary-$arch/ . - -- - ---------------------------------------------------------------------------- For apt-get: deb http://security.debian.org/ stable updates For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- Version: 2.6.3ia Charset: noconv iQB1AwUBOJdQNajZR/ntlUftAQEKrQL6Ahgoy2SulJ17fhY1vWVEUxlyTS1RN9wm qqNNgfgAj1b9vv6Ws00FkVO1gphByFC2je1qTIsPzPq1uwO3EYTBle6q6E4m49WN BN0r2FpV9XfsqHTJMIJImCJu9McAF5wW =B1od -----END PGP SIGNATURE----- (4757150) ------------------------------------------(Ombruten)