[ SOURCE: http://www.secureroot.com/security/advisories/9771794412.html ] -----BEGIN PGP SIGNED MESSAGE----- - ------------------------------------------------------------------------ Debian Security Advisory DSA-004-1 security@debian.org http://www.debian.org/security/ Wichert Akkerman December 17, 2000 - ------------------------------------------------------------------------ Package : nano Problem type : symlink attack Debian-specific: no The problem that was previously reported for joe also occurs with other editors. When nano (a free pico clone) unexpectedly dies it tries a warning message to a new file with a predictable name (the name of the file being edited with ".save" appended). Unfortunately that file was not created safely which made nano vulnerable to a symlink attack. This has been fixed in version 0.9.23-1 (except for powerpc, which has version 0.9.23-1.1). wget url will fetch the file for you dpkg -i file.deb will install the referenced file. Debian GNU/Linux 2.2 alias potato - --------------------------------- Potato was released for alpha, arm, i386, m68k, powerpc and sparc. Source archives: http://security.debian.org/dists/stable/updates/main/source/nano_0.9.23-1.diff.gz MD5 checksum: 5c878e43e5161ee25043f60886c88b03 http://security.debian.org/dists/stable/updates/main/source/nano_0.9.23-1.dsc MD5 checksum: 85879b609fbcd5b091e686d16e75865b http://security.debian.org/dists/stable/updates/main/source/nano_0.9.23.orig.tar.gz MD5 checksum: 56bdf48e0d56b83ca669ec813cc0d466 Alpha architecture: http://security.debian.org/dists/stable/updates/main/binary-alpha/nano-tiny_0.9.23-1_alpha.deb MD5 checksum: f7bba57357225edc934d5adb1ef2259e http://security.debian.org/dists/stable/updates/main/binary-alpha/nano_0.9.23-1_alpha.deb MD5 checksum: c6a99a014225016f86f367a4ec0edf8b ARM architecture: http://security.debian.org/dists/stable/updates/main/binary-arm/nano-tiny_0.9.23-1_arm.deb MD5 checksum: 4a3e6f9140e874bc502149b610007307 http://security.debian.org/dists/stable/updates/main/binary-arm/nano_0.9.23-1_arm.deb MD5 checksum: 111c0a9180e07868cb471c47cace287e Intel ia32 architecture: http://security.debian.org/dists/stable/updates/main/binary-i386/nano-tiny_0.9.23-1_i386.deb MD5 checksum: fd018ffdb6bf1932b96473969bcf9ef9 http://security.debian.org/dists/stable/updates/main/binary-i386/nano_0.9.23-1_i386.deb MD5 checksum: ce7487c7aa0ce8ed1b791f51b5ece31c Motorola 680x0 architecture: http://security.debian.org/dists/stable/updates/main/binary-m68k/nano-tiny_0.9.23-1_m68k.deb MD5 checksum: 49261ca3f044d318dda67069527d4260 http://security.debian.org/dists/stable/updates/main/binary-m68k/nano_0.9.23-1_m68k.deb MD5 checksum: 0a0ac605a31e49674ceb0d3b5d3aa0a8 PowerPC architecture: http://security.debian.org/dists/stable/updates/main/binary-powerpc/nano-tiny_0.9.23-1.1_powerpc.deb MD5 checksum: c6d4ec4efd2853f4acd35a4ec5e951c8 http://security.debian.org/dists/stable/updates/main/binary-powerpc/nano_0.9.23-1.1_powerpc.deb MD5 checksum: 69df7777cedcc4aba0134a4838614aca Sun Sparc architecture: http://security.debian.org/dists/stable/updates/main/binary-sparc/nano-tiny_0.9.23-1_sparc.deb MD5 checksum: 912ba97af630e91e2878190d373ab375 http://security.debian.org/dists/stable/updates/main/binary-sparc/nano_0.9.23-1_sparc.deb MD5 checksum: 6098621e245ed89c4b09772601c957e0 These files will be moved into ftp://ftp.debian.org/debian/dists/stable/*/binary-$arch/ soon. For not yet released architectures please refer to the appropriate directory ftp://ftp.debian.org/debian/dists/sid/binary-$arch/ . - -- - ---------------------------------------------------------------------------- apt-get: deb http://security.debian.org/ stable/updates main dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- Version: 2.6.3ia Charset: noconv iQB1AwUBOjwRPqjZR/ntlUftAQH1iwL/bu120g7gHAsxFYJ4pl5lO937NedpaQvX sX1JamVexYLNuiamV44iwRN9kiNTBaUNaSfDX8NeL0X/cUuCa6RX841mjeDcRy3j ZaEafWvyC0qioxQhqwH3sHitRQviZlmB =QgKa -----END PGP SIGNATURE----- -- To UNSUBSCRIBE, email to debian-security-announce-request@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org