現在の Debian 安定版 (2.2 potato) にセキュリティに関する深刻な問題が発見 されました。 対象パッケージ: glibc 対処済みのパッケージに更新するには、 deb http://security.debian.org/ stable/updates main を /etc/apt/sources.list に追加し、 apt-get update ; apt-get upgrade を実行してください。 詳細については添付のアナウンスをご覧ください。
--- Begin Message ---
- From: Wichert Akkerman <wichert@xxxxxxxxxx>
- Subject: [SECURITY] [DSA-039-1] glibc local file overwrite problems
- Date: Thu, 8 Mar 2001 18:46:59 +0100
- Priority: urgent
- Resent-date: Fri, 9 Mar 2001 02:56:07 +0900 (JST)
- Resent-from: debian-security-announce@lists.debian.org
- Resent-message-id: <8TiOeB.A.Ia.oX8p6@murphy>
- Resent-sender: debian-security-announce-request@lists.debian.org
- X-debian: PGP check passed for security officers
- X-envelope-sender: wichert@xxxxxxxxxx
- X-loop: debian-security-announce@lists.debian.org
- X-mailing-list: <debian-security-announce@lists.debian.org> archive/latest/219
- Message-id: <200103081746.f28Hkxs24646@xxxxxxxxxxxxxxxxxx>
-----BEGIN PGP SIGNED MESSAGE----- - ------------------------------------------------------------------------ Debian Security Advisory DSA-039-1 security@debian.org http://www.debian.org/security/ Wichert Akkerman March 8, 2001 - ------------------------------------------------------------------------ Package : glibc Problem type : local file overwrite Debian-specific: no The version of GNU libc that was distributed with Debian GNU/Linux 2.2 suffered from 2 security problems: * It was possible to use LD_PRELOAD to load libraries that are listed in /etc/ld.so.cache, even for suid programs. This could be used to create (and overwrite) files which a user should not be allowed to. * by using LD_PROFILE suid programs would write data to a file to /var/tmp, which was not done safely. Again, this could be used to create (and overwrite) files which a user should not have access to. Both problems have been fixed in version 2.1.3-17 and we recommend that you upgrade your glibc packages immediately. Please note that a side-effect of this upgrade is that ldd will no longer work on suid programs, unless you logged in as root. wget url will fetch the file for you dpkg -i file.deb will install the referenced file. Debian GNU/Linux 2.2 alias potato - --------------------------------- Potato was released for alpha, arm, i386, m68k, powerpc and sparc. Source archives: http://security.debian.org/dists/stable/updates/main/source/glibc_2.1.3-17.diff.gz MD5 checksum: 2d09dcf45482a2c4400e033c92112110 http://security.debian.org/dists/stable/updates/main/source/glibc_2.1.3-17.dsc MD5 checksum: 0483ad39d31a54db8781fddb79240e5d http://security.debian.org/dists/stable/updates/main/source/glibc_2.1.3.orig.tar.gz MD5 checksum: aea1bb5c28f793013153d1b8f91eb746 Architecture indendent archives: http://security.debian.org/dists/stable/updates/main/binary-all/glibc-doc_2.1.3-17_all.deb MD5 checksum: 06a18fbeee849642b48ff14cc0633984 http://security.debian.org/dists/stable/updates/main/binary-all/i18ndata_2.1.3-17_all.deb MD5 checksum: 272079ae1d3afe16b18cbc3d903a5685 Alpha architecture: http://security.debian.org/dists/stable/updates/main/binary-alpha/libc6.1-dbg_2.1.3-17_alpha.deb MD5 checksum: 28e3d452aee9a89a7883885b76c7dc66 http://security.debian.org/dists/stable/updates/main/binary-alpha/libc6.1-dev_2.1.3-17_alpha.deb MD5 checksum: 452a709107c611efffb6e4ff3697eb10 http://security.debian.org/dists/stable/updates/main/binary-alpha/libc6.1-pic_2.1.3-17_alpha.deb MD5 checksum: 68208d16954c2f81fe38a41fc6b83720 http://security.debian.org/dists/stable/updates/main/binary-alpha/libc6.1-prof_2.1.3-17_alpha.deb MD5 checksum: dc0ba72ff66b3e25213e6ab12c927941 http://security.debian.org/dists/stable/updates/main/binary-alpha/libc6.1_2.1.3-17_alpha.deb MD5 checksum: 3e75804a7de8a317304dc4b615e290d3 http://security.debian.org/dists/stable/updates/main/binary-alpha/libnss1-compat_2.1.3-17_alpha.deb MD5 checksum: 6f4bf6d43ef36117efe43bad15159dc4 http://security.debian.org/dists/stable/updates/main/binary-alpha/locales_2.1.3-17_alpha.deb MD5 checksum: 443417e614a33cf70d296fedb6733873 http://security.debian.org/dists/stable/updates/main/binary-alpha/nscd_2.1.3-17_alpha.deb MD5 checksum: 86edee3f212a0d4c769d37eb8e6de404 ARM architecture: http://security.debian.org/dists/stable/updates/main/binary-arm/libc6-dbg_2.1.3-17_arm.deb MD5 checksum: 63e3785e0c034ad086014a07a641b43d http://security.debian.org/dists/stable/updates/main/binary-arm/libc6-dev_2.1.3-17_arm.deb MD5 checksum: 3cf45427598f3c92c5744b647f14a315 http://security.debian.org/dists/stable/updates/main/binary-arm/libc6-pic_2.1.3-17_arm.deb MD5 checksum: 30ae1c962cae0d1df3fcd8924a7eb6d3 http://security.debian.org/dists/stable/updates/main/binary-arm/libc6-prof_2.1.3-17_arm.deb MD5 checksum: 5e4b00337e8cf44cd94125a30decf409 http://security.debian.org/dists/stable/updates/main/binary-arm/libc6_2.1.3-17_arm.deb MD5 checksum: 0b4c9b9715d91fd9474a6a33775821b8 http://security.debian.org/dists/stable/updates/main/binary-arm/locales_2.1.3-17_arm.deb MD5 checksum: fce2f8c6d697ed386557fcf92ef4ce47 http://security.debian.org/dists/stable/updates/main/binary-arm/nscd_2.1.3-17_arm.deb MD5 checksum: 946568baddaf2ef3430bc3e27c464079 Intel ia32 architecture: http://security.debian.org/dists/stable/updates/main/binary-i386/libc6-dbg_2.1.3-17_i386.deb MD5 checksum: a11f04dc605f9e0692bad7c43f29b90a http://security.debian.org/dists/stable/updates/main/binary-i386/libc6-dev_2.1.3-17_i386.deb MD5 checksum: c92017b2d71066fb0ffada1090c72863 http://security.debian.org/dists/stable/updates/main/binary-i386/libc6-pic_2.1.3-17_i386.deb MD5 checksum: c4523e2dfa76352db81bb7c3852e52eb http://security.debian.org/dists/stable/updates/main/binary-i386/libc6-prof_2.1.3-17_i386.deb MD5 checksum: f752ce83bdb45c106a564107727f4ac9 http://security.debian.org/dists/stable/updates/main/binary-i386/libc6_2.1.3-17_i386.deb MD5 checksum: 2e97ae1db914e6bf1bbf9f622668802a http://security.debian.org/dists/stable/updates/main/binary-i386/libnss1-compat_2.1.3-17_i386.deb MD5 checksum: 80592eeaf265a2fa5e4ec17429bd7a29 http://security.debian.org/dists/stable/updates/main/binary-i386/locales_2.1.3-17_i386.deb MD5 checksum: 95d336a17cbab782802304546b88f252 http://security.debian.org/dists/stable/updates/main/binary-i386/nscd_2.1.3-17_i386.deb MD5 checksum: 3ac365c22541b0322f3f7acd4487362f Motorola 680x0 architecture: http://security.debian.org/dists/stable/updates/main/binary-m68k/libc6-dbg_2.1.3-17_m68k.deb MD5 checksum: 73c51ecef6cb349e1c05c94d98b7f08f http://security.debian.org/dists/stable/updates/main/binary-m68k/libc6-dev_2.1.3-17_m68k.deb MD5 checksum: fdb40a30e553dbda2928913e97869dac http://security.debian.org/dists/stable/updates/main/binary-m68k/libc6-pic_2.1.3-17_m68k.deb MD5 checksum: 4ac47fdd91bb3e74ffb88903f9aa2a2f http://security.debian.org/dists/stable/updates/main/binary-m68k/libc6-prof_2.1.3-17_m68k.deb MD5 checksum: 1ac2effcfa957fba33364f15a0e6a0ad http://security.debian.org/dists/stable/updates/main/binary-m68k/libc6_2.1.3-17_m68k.deb MD5 checksum: 9fa4049d37577c6bf84b6c3b618a3cf7 http://security.debian.org/dists/stable/updates/main/binary-m68k/libnss1-compat_2.1.3-17_m68k.deb MD5 checksum: 09e08e0912fb30238c888aa95f2ea5a2 http://security.debian.org/dists/stable/updates/main/binary-m68k/locales_2.1.3-17_m68k.deb MD5 checksum: 6d4ad26d19cf6309369c59279d243c2f http://security.debian.org/dists/stable/updates/main/binary-m68k/nscd_2.1.3-17_m68k.deb MD5 checksum: b553448be9a6b872d2c38a606476b154 PowerPC architecture: http://security.debian.org/dists/stable/updates/main/binary-powerpc/libc6-dbg_2.1.3-17_powerpc.deb MD5 checksum: 7737f33dab4073f2f068675d0290f2e2 http://security.debian.org/dists/stable/updates/main/binary-powerpc/libc6-dev_2.1.3-17_powerpc.deb MD5 checksum: 018fcbba3194cbf39617c17d769390ac http://security.debian.org/dists/stable/updates/main/binary-powerpc/libc6-pic_2.1.3-17_powerpc.deb MD5 checksum: 301d0bb507a617baeede970249eaad65 http://security.debian.org/dists/stable/updates/main/binary-powerpc/libc6-prof_2.1.3-17_powerpc.deb MD5 checksum: 47a36a1dcdcf10b1ff5781f3a433eba7 http://security.debian.org/dists/stable/updates/main/binary-powerpc/libc6_2.1.3-17_powerpc.deb MD5 checksum: 80b640aa7d99456cb0fe394a25a9e36b http://security.debian.org/dists/stable/updates/main/binary-powerpc/locales_2.1.3-17_powerpc.deb MD5 checksum: 9c44c79bf5c8767e3d144c6b9521b925 http://security.debian.org/dists/stable/updates/main/binary-powerpc/nscd_2.1.3-17_powerpc.deb MD5 checksum: 359dc2ec51ec194da9ad5f7fd808ccc4 Sun Sparc architecture: http://security.debian.org/dists/stable/updates/main/binary-sparc/libc6-dbg_2.1.3-17_sparc.deb MD5 checksum: e63563d43a5e7e016e21c44b80ae530b http://security.debian.org/dists/stable/updates/main/binary-sparc/libc6-dev_2.1.3-17_sparc.deb MD5 checksum: 32dd22813fe5db4e77ff9d0bc8df74ca http://security.debian.org/dists/stable/updates/main/binary-sparc/libc6-pic_2.1.3-17_sparc.deb MD5 checksum: 648c72da9cd496f265c8a8426fa47516 http://security.debian.org/dists/stable/updates/main/binary-sparc/libc6-prof_2.1.3-17_sparc.deb MD5 checksum: c664c5e1b2fd9d2a3d856130f7750c70 http://security.debian.org/dists/stable/updates/main/binary-sparc/libc6_2.1.3-17_sparc.deb MD5 checksum: 67123f10a4b04251c6922313c70102af http://security.debian.org/dists/stable/updates/main/binary-sparc/locales_2.1.3-17_sparc.deb MD5 checksum: 895333e421ac054533b2cf3a989d2675 http://security.debian.org/dists/stable/updates/main/binary-sparc/nscd_2.1.3-17_sparc.deb MD5 checksum: 7be597a2a98e985bd2f9cca65049d16f These files will be moved into ftp://ftp.debian.org/debian/dists/stable/*/binary-$arch/ soon. For not yet released architectures please refer to the appropriate directory ftp://ftp.debian.org/debian/dists/sid/binary-$arch/ . - -- - ---------------------------------------------------------------------------- apt-get: deb http://security.debian.org/ stable/updates main dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- Version: 2.6.3ia Charset: noconv iQB1AwUBOqfFjajZR/ntlUftAQGLRgL+NV+2UtyIoJHV9ij6eGhA7vFV/TRfDGzq FJ1s0sBGhIePvOFuywd3jDe24Q4+eq/XruhdE+cRI5ZnMoQ14A4WPpGODSb2kL50 IM+7Uk202Xu0FnvUmG73VwXJCrcPZxQn =17V3 -----END PGP SIGNATURE----- -- To UNSUBSCRIBE, email to debian-security-announce-request@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org
--- End Message ---
Attachment:
pgpz5wYpXEuA7.pgp
Description: PGP signature