Debian Security Advisory DSA-011-1 - Mgetty does not create temporary files in a secure manner, which could lead to a symlink attack. This has been corrected in mgetty 1.1.21-3potato1.
18198c10a582b5c688bf77dd7360222175504d0a1fd55438b835e2649cc357bd
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- ----------------------------------------------------------------------------
Debian Security Advisory DSA-011-2 security@debian.org
https://www.debian.org/security/ Martin Schulze
March 6, 2001
- ----------------------------------------------------------------------------
Package : mgetty
Vulnerability : insecure tempfile creation
Debian-specific: no
In Debian Security Advisory DSA 011-1 we have reported insecure
creation of temporary files in the mgetty package that have been
fixed. For details please read the main advisory.
The most recent advisory covering proftpd missed two architectures that
were released with Debian GNU/Linux 2.2. Therefore this advisory is
only an addition to DSA 011-1 and only adds the relevant package for
the Motorola 680x0 and PowerPC architecture.
We recommend you upgrade your sudo packages for m68k immediately.
wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.
You may use an automated update by adding the resources from the
footer to the proper configuration.
Debian GNU/Linux 2.2 alias potato
- ------------------------------------
Potato was released for the alpha, arm, i386, m68k, powerpc and sparc
architectures.
Motorola 680x0 architecture:
https://security.debian.org/dists/stable/updates/main/binary-m68k/mgetty-fax_1.1.21-3potato1_m68k.deb
MD5 checksum: c175cdd07927e5a6e9f6ebecbd91366b
https://security.debian.org/dists/stable/updates/main/binary-m68k/mgetty-viewfax_1.1.21-3potato1_m68k.deb
MD5 checksum: 8aa48ed8b00d7873452cac3970c47877
https://security.debian.org/dists/stable/updates/main/binary-m68k/mgetty-voice_1.1.21-3potato1_m68k.deb
MD5 checksum: 89a9c11cfaa04cac4f2cc752714e1f3f
https://security.debian.org/dists/stable/updates/main/binary-m68k/mgetty_1.1.21-3potato1_m68k.deb
MD5 checksum: 40b004e0dcaad89253a552e823809f7a
PowerPC architecture:
https://security.debian.org/dists/stable/updates/main/binary-powerpc/mgetty_1.1.21-3potato1_powerpc.deb
MD5 checksum: fe951cbfbbd37d26cd7c210ee9eee8a1
https://security.debian.org/dists/stable/updates/main/binary-powerpc/mgetty-fax_1.1.21-3potato1_powerpc.deb
MD5 checksum: e9b3c8b63f82333cc8cb22eeecaaa1c9
https://security.debian.org/dists/stable/updates/main/binary-powerpc/mgetty-viewfax_1.1.21-3potato1_powerpc.deb
MD5 checksum: afbed28e1382f53cfdca42c089d56516
https://security.debian.org/dists/stable/updates/main/binary-powerpc/mgetty-voice_1.1.21-3potato1_powerpc.deb
MD5 checksum: 244d5c6525382b342117ec2e72ee0f1c
These files will be moved into
ftp://ftp.debian.org/debian/dists/stable/*/binary-$arch/ soon.
For not yet released architectures please refer to the appropriate
directory ftp://ftp.debian.org/debian/dists/sid/binary-$arch/ .
- ----------------------------------------------------------------------------
For apt-get: deb https://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and https://packages.debian.org/<pkg>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.4 (GNU/Linux)
Comment: For info see https://www.gnupg.org
iD8DBQE6pEaUW5ql+IAeqTIRAmP6AJ9v+Bq/HsY25wy2lKIsMqYZk7kzYACfYsdI
s8xTuLHFx8t4cPUGG1d0a6c=
=cJZr
-----END PGP SIGNATURE-----
--
To UNSUBSCRIBE, email to debian-security-announce-request@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org