- --------------------------------------------------------------------------Debian Security Advisory DSA 835-1 security@debian.org
http://www.debian.org/security/ Martin Schulze
October 1st, 2005 http://www.debian.org/security/faq
- --------------------------------------------------------------------------Package : cfengine
Vulnerability : insecure temporary files
Problem type : local
Debian-specific: no
CVE ID : CAN-2005-2960
Javier Fernández-Sanguino Peña discovered several insecure temporary
file uses in cfengine, a tool for configuring and maintaining
networked machines, that can be exploited by a symlink attack to
overwrite arbitrary files owned by the user executing cfengine, which
is probably root.
For the old stable distribution (woody) these problems have been fixed in
version 1.6.3-9woody1.
For the stable distribution (sarge) these problems have been fixed in
version 1.6.5-1sarge1.
For the unstable distribution (sid) these problems have will be fixed soon.
We recommend that you upgrade your cfengine package.
Upgrade Instructions
- --------------------wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.
If you are using the apt-get package manager, use the line for
sources.list as given below:
apt-get update
will update the internal database
apt-get upgrade
will install corrected packages
You may use an automated update by adding the resources from the
footer to the proper configuration.
Debian GNU/Linux 3.0 alias woody
- -------------------------------- Source archives:
Size/MD5 checksum: 697 bb2e5be7b89c57f6c4cf1e3738ecd922
Size/MD5 checksum: 38077 1ae76d1eb77ebd60a3333c062a1a7c31
Size/MD5 checksum: 867415 19079eafbee44e3d39308c086d4b539b
Architecture independent components:
Size/MD5 checksum: 355562 ca9a13fab7548459c6084dc69d426aec
Alpha architecture:
Size/MD5 checksum: 405720 7b6364578e2eba666365e77e32507c4b
ARM architecture:
Size/MD5 checksum: 339210 aa977174967f661d2f212f3433bf6788
Intel IA-32 architecture:
Size/MD5 checksum: 303270 a64338d36f68b7935cfc5989c850cd5e
Intel IA-64 architecture:
Size/MD5 checksum: 493172 41bcf6762cf4837c8709be21cff9eb7f
HP Precision architecture:
Size/MD5 checksum: 386724 e9442e863083edcb1e487a6c5fe93352
Motorola 680x0 architecture:
Size/MD5 checksum: 281060 d948916061d5e8efb533e3b77b77a0ab
Big endian MIPS architecture:
Size/MD5 checksum: 363318 0bc37a72bb1f08f35a2b579484ffb573
Little endian MIPS architecture:
Size/MD5 checksum: 361536 c2b6aa55d276d9b6ac74e78b8117f58c
PowerPC architecture:
Size/MD5 checksum: 340640 d54511ed3ad4994ae81fa8f5d94bddd2
IBM S/390 architecture:
Size/MD5 checksum: 320202 4bfb085818e449b6a6a294d842fd93ce
Sun Sparc architecture:
Size/MD5 checksum: 348898 1a5bee66a3136dd0c7c81e389ea6d02c
Debian GNU/Linux 3.1 alias sarge
- -------------------------------- Source archives:
Size/MD5 checksum: 688 0c5710c1edf3c6fdd6823d6db891d299
Size/MD5 checksum: 102832 8a282e6d4dde8c710e02a544967c5fe6
Size/MD5 checksum: 880066 fc02d8d56433f32020c3030192cad66e
Architecture independent components:
Size/MD5 checksum: 385994 1081dd615fdd1cd5682599b5253936ba
Alpha architecture:
Size/MD5 checksum: 420810 2402bacaa76d7763c27589c85a399605
AMD64 architecture:
Size/MD5 checksum: 353842 953d1eb46f2cce0aedfb78e5f988cc53
ARM architecture:
Size/MD5 checksum: 340160 83ed417663d90df0727a6a8c2606d11b
Intel IA-32 architecture:
Size/MD5 checksum: 323384 18459b30d0c2c5044e6922abde4425ea
Intel IA-64 architecture:
Size/MD5 checksum: 488116 f7a1c07bf59ba6163a82fed6a27666c1
HP Precision architecture:
Size/MD5 checksum: 373982 778d47c9a7bba6a52c34580e2885a4f0
Motorola 680x0 architecture:
Size/MD5 checksum: 289354 a8c67ffa26a9453959be270dd6109a36
Big endian MIPS architecture:
Size/MD5 checksum: 366596 5978436e06a6fb7ad82d7f9860d02614
Little endian MIPS architecture:
Size/MD5 checksum: 365032 4914663ccd6d58abfac5ae149c2b75cb
PowerPC architecture:
Size/MD5 checksum: 356614 a98b9bb1a97577472f350ae0f22bf37f
IBM S/390 architecture:
Size/MD5 checksum: 346324 33ac8dfdaa2fcb7ddccf258f901b8531
Sun Sparc architecture:
Size/MD5 checksum: 338540 21169b41e6976910873d642a7acef495
These files will probably be moved into the stable distribution on
its next update.
- ---------------------------------------------------------------------------------For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org