LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Advisory Watch: September 26th, 2014
Linux Security Week: September 22nd, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Debian: New gforge packages fix insecure temporary files Print E-mail
User Rating:      How can I rate this item?
Posted by Benjamin D. Thomas   
Debian Stephen Gran and Mark Hymers discovered that some scripts run by GForge, a collaborative development tool, open files in write mode in a potentially insecure manner. This may be exploited to overwrite arbitary files on the local system.
- ------------------------------------------------------------------------
Debian Security Advisory DSA-1577-1                  security@debian.org
http://www.debian.org/security/                          Thijs Kinkhorst
May 14, 2008                          http://www.debian.org/security/faq
- ------------------------------------------------------------------------

Package        : gforge
Vulnerability  : insecure temporary files
Problem type   : local
Debian-specific: no
CVE Id(s)      : CVE-2008-0167

Stephen Gran and Mark Hymers discovered that some scripts run by GForge,
a collaborative development tool, open files in write mode in a potentially
insecure manner. This may be exploited to overwrite arbitary files on the
local system.

For the stable distribution (etch), this problem has been fixed in version
4.5.14-22etch8.

For the unstable distribution (sid), this problem will be fixed soon.

We recommend that you upgrade your gforge package.

Upgrade instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 4.0 alias etch
- -------------------------------

Source archives:

  http://security.debian.org/pool/updates/main/g/gforge/gforge_4.5.14-22etch8.dsc
    Size/MD5 checksum:      950 b920bc8243418bf618256638369bc4cd
  http://security.debian.org/pool/updates/main/g/gforge/gforge_4.5.14.orig.tar.gz
    Size/MD5 checksum:  2161141 e85f82eff84ee073f80a2a52dd32c8a5
  http://security.debian.org/pool/updates/main/g/gforge/gforge_4.5.14-22etch8.diff.gz
    Size/MD5 checksum:   198227 d2fa0c2fcd092cca4b06fa58c852bacc

Architecture independent packages:

  http://security.debian.org/pool/updates/main/g/gforge/gforge-mta-exim_4.5.14-22etch8_all.deb
    Size/MD5 checksum:    88632 653a57ad16301d4c56dd6258c7899bf3
  http://security.debian.org/pool/updates/main/g/gforge/gforge-web-apache_4.5.14-22etch8_all.deb
    Size/MD5 checksum:   704846 40d23715b91b68be2818f3cd40fcd69f
  http://security.debian.org/pool/updates/main/g/gforge/gforge-mta-courier_4.5.14-22etch8_all.deb
    Size/MD5 checksum:    76104 b9536b17b890cb1e9c01774799a2b7a7
  http://security.debian.org/pool/updates/main/g/gforge/gforge_4.5.14-22etch8_all.deb
    Size/MD5 checksum:    80300 14cb35a87fcd66ec653f2f195f1257ba
  http://security.debian.org/pool/updates/main/g/gforge/gforge-mta-postfix_4.5.14-22etch8_all.deb
    Size/MD5 checksum:    88530 949dba8de49b5294a6c1607c0e0867a9
  http://security.debian.org/pool/updates/main/g/gforge/gforge-shell-ldap_4.5.14-22etch8_all.deb
    Size/MD5 checksum:    86364 e5b31d0d6241fc49af69fa18a43ca5cb
  http://security.debian.org/pool/updates/main/g/gforge/gforge-shell-postgresql_4.5.14-22etch8_all.deb
    Size/MD5 checksum:    87170 4c43a30b39c833c6459bebf65efa3ffd
  http://security.debian.org/pool/updates/main/g/gforge/gforge-common_4.5.14-22etch8_all.deb
    Size/MD5 checksum:  1010898 6834ceb2ad8bec97dec9885f5d67a142
  http://security.debian.org/pool/updates/main/g/gforge/gforge-db-postgresql_4.5.14-22etch8_all.deb
    Size/MD5 checksum:   212528 aa2271a99ae166fda40c1dac6e866548
  http://security.debian.org/pool/updates/main/g/gforge/gforge-ftp-proftpd_4.5.14-22etch8_all.deb
    Size/MD5 checksum:    86070 5dc7c68b4c4d9a42809836405b85a240
  http://security.debian.org/pool/updates/main/g/gforge/gforge-mta-exim4_4.5.14-22etch8_all.deb
    Size/MD5 checksum:    89146 ca4c0ca3f759fac3419e9523ec7772a2
  http://security.debian.org/pool/updates/main/g/gforge/gforge-lists-mailman_4.5.14-22etch8_all.deb
    Size/MD5 checksum:    82106 706a78d1a7d86304890844b61988b580
  http://security.debian.org/pool/updates/main/g/gforge/gforge-ldap-openldap_4.5.14-22etch8_all.deb
    Size/MD5 checksum:    95576 a2bba36bc643f1adf1950574fa38ff1d
  http://security.debian.org/pool/updates/main/g/gforge/gforge-dns-bind9_4.5.14-22etch8_all.deb
    Size/MD5 checksum:   103780 666082ac03c7edecc48fce7072890654

  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
 
< Prev   Next >
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Honeypot Snares Two Bots Exploiting Bash Vulnerability
CloudFlare Rolls Out Free SSL
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.