Debian alert: nedit symlink attack

Posted by dave on Apr 26, 2001 2:32 PM EDT
Mailing list
Mail this story
Print this story

The nedit (Nirvana editor) package as shipped in the non-free section accompanying Debian GNU/Linux 2.2/potato had a bug in its printing code: when printing text it would create a temporary file with the to be printed text and pass that on to the print system. The temporary file was not created safely, which could be exploited by an attacked to make nedit overwrite arbitrary files.

-----BEGIN PGP SIGNED MESSAGE-----

- ------------------------------------------------------------------------
Debian Security Advisory DSA-053-1                   security@debian.org
http://www.debian.org/security/                         Wichert Akkerman
April 27, 2001
- ------------------------------------------------------------------------


Package        : nedit
Problem type   : insecure temporary file
Debian-specific: no

The nedit (Nirvana editor) package as shipped in the non-free section
accompanying Debian GNU/Linux 2.2/potato had a bug in its printing code:
when printing text it would create a temporary file with the to be
printed text and pass that on to the print system. The temporary file
was not created safely, which could be exploited by an attacked to make
nedit overwrite arbitrary files.

This has been fixed in version 5.02-7.1.

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.


Debian GNU/Linux 2.2 alias potato
- ---------------------------------

  Potato was released for alpha, arm, i386, m68k, powerpc and sparc.

  Source archives:
    http://security.debian.org/dists/stable/updates/non-free/source/nedit_5.02-7.1.diff.gz
      MD5 checksum: 82b90eea8263fd3f6140b40737f1fc16
    http://security.debian.org/dists/stable/updates/non-free/source/nedit_5.02-7.1.dsc
      MD5 checksum: e14d25693dab3e329a93bdca10a45f03
    http://security.debian.org/dists/stable/updates/non-free/source/nedit_5.02.orig.tar.gz
      MD5 checksum: 2d8d0a8ec173fde6d574ffef40bbc524

  Alpha architecture:
    http://security.debian.org/dists/stable/updates/non-free/binary-alpha/nedit_5.02-7.1_alpha.deb
      MD5 checksum: 18b921a22b20423e1e10ea599f8e98a3

  ARM architecture:
    http://security.debian.org/dists/stable/updates/non-free/binary-arm/nedit_5.02-7.1_arm.deb
      MD5 checksum: 748d639bc26e810a23fb4911b5a93da0

  Intel ia32 architecture:
    http://security.debian.org/dists/stable/updates/non-free/binary-i386/nedit_5.02-7.1_i386.deb
      MD5 checksum: 1ad6fee0f55443820817b6a7e702afbf

  Motorola 680x0 architecture:
    http://security.debian.org/dists/stable/updates/non-free/binary-m68k/nedit_5.02-7.1_m68k.deb
      MD5 checksum: eecbe4dd085e4d3588d1b1e2ce394af7

  PowerPC architecture:
    http://security.debian.org/dists/stable/updates/non-free/binary-powerpc/nedit_5.02-7.1_powerpc.deb
      MD5 checksum: abb9cbbee1abf13ba7d7cbcc16caf07a

  Sun Sparc architecture:
    http://security.debian.org/dists/stable/updates/non-free/binary-sparc/nedit_5.02-7.1_sparc.deb
      MD5 checksum: cc465ff49985a82cd150fb38f449f75b


  These packages will be moved into the stable distribution on its next
  revision.

For not yet released architectures please refer to the appropriate
directory ftp://ftp.debian.org/debian/dists/sid/binary-$arch/ .

- -- 
- ----------------------------------------------------------------------------
apt-get: deb http://security.debian.org/ stable/updates main
dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3ia
Charset: noconv

iQB1AwUBOuihw6jZR/ntlUftAQG9QwL/aJ/aSrN/rBGfg3tg2Q5IxreH67klTWed
no439vZiR8ORJEJdW9rtYyqJt8rW0ZlVdG4QRATXXH8ibZuIYagttqurgFtlpHnc
rCu3FvKvNZvecfyAvYtM7F3/eFj1ZyS9
=Fq0C
-----END PGP SIGNATURE-----


  Nav
» Read more about: Story Type: Security; Groups: Debian

« Return to the newswire homepage

This topic does not have any threads posted yet!

You cannot post until you login.