From:	 Martin Schulze <joey@finlandia.infodrom.north.de>
To:	 Debian Security Announcements <debian-security-announce@lists.debian.org>
Subject: [SECURITY] [DSA 079-1] New UUCP packages fix local exploit
Date:	 Mon, 24 Sep 2001 14:44:41 +0200

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ----------------------------------------------------------------------------
Debian Security Advisory DSA 079-1                       security@debian.org
http://www.debian.org/security/                               Martin Schulze
September 24, 2001
- ----------------------------------------------------------------------------

Package        : uucp
Vulnerability  : uucp uid/gid access
Problem-Type   : local exploit
Debian-specific: no

zen-parse has found a problem with Taylor UUCP as distributed with
many GNU/Linux distributions.  It was possible to make `uux' execute
`uucp' with malicious commandline arguments which gives an attacker
access to files owned by uid/gid uucp.

This problem has been fixed in version of 1.06.1-11potato1 for Debian
GNU/Linux 2.2 by using a patch that RedHat has provided.

We recommend that you upgrade your uucp package immediately.

wget url
	will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 2.2 alias potato
- ------------------------------------


  Source archives:

    http://security.debian.org/dists/stable/updates/main/source/uucp_1.06.1-11potato1.diff.gz
      MD5 checksum: 4e2f02a4abd2ce86ffb0e154ef5d162b
    http://security.debian.org/dists/stable/updates/main/source/uucp_1.06.1-11potato1.dsc
      MD5 checksum: fd358e7e14f32ffa16cd3f2e6137b05c
    http://security.debian.org/dists/stable/updates/main/source/uucp_1.06.1.orig.tar.gz
      MD5 checksum: 390af5277915fcadbeee74d2f3038af9

  Alpha architecture:

    http://security.debian.org/dists/stable/updates/main/binary-alpha/uucp_1.06.1-11potato1_alpha.deb
      MD5 checksum: c1ad1038530a5ee1a6fb92fb90be287f

  ARM architecture:

    http://security.debian.org/dists/stable/updates/main/binary-arm/uucp_1.06.1-11potato1_arm.deb
      MD5 checksum: 5821d1b6b9bccfa7486183216ffc7dfa

  Intel ia32 architecture:

    http://security.debian.org/dists/stable/updates/main/binary-i386/uucp_1.06.1-11potato1_i386.deb
      MD5 checksum: deb9d76651686c2b0a2d51488e3cf0da

  Motorola 680x0 architecture:

    http://security.debian.org/dists/stable/updates/main/binary-m68k/uucp_1.06.1-11potato1_m68k.deb
      MD5 checksum: 37f78dceb1e6c3b492246c888a744af7

  PowerPC architecture:

    http://security.debian.org/dists/stable/updates/main/binary-powerpc/uucp_1.06.1-11potato1_powerpc.deb
      MD5 checksum: e2a81774e4cd6c1eabbcf1c8fbf2e406

  Sun Sparc architecture:

    http://security.debian.org/dists/stable/updates/main/binary-sparc/uucp_1.06.1-11potato1_sparc.deb
      MD5 checksum: 28148692a588b9b0c9b7598d0084fd2a


  These files will be moved into the stable distribution on its next
  revision.

- ----------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.6 (GNU/Linux)
Comment: For info see http://www.gnupg.org

iD8DBQE7ryqnW5ql+IAeqTIRAg85AKC3WjUR7+pcdnNzqJTKYCgAW7JPcgCgoKJz
Eyo1dUud25pN5l8FnvaeCas=
=rFIN
-----END PGP SIGNATURE-----


-- 
To UNSUBSCRIBE, email to debian-security-announce-request@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org