Debian Security Advisory
DSA-1674-1 jailer -- insecure temp file generation
- Date Reported:
- 30 Nov 2008
- Affected Packages:
- jailer
- Vulnerable:
- Yes
- Security database references:
- In the Debian bugtracking system: Bug 410548.
In Mitre's CVE dictionary: CVE-2008-5139. - More information:
-
Javier Fernandez-Sanguino Pena discovered that updatejail, a component of the chroot maintenance tool Jailer, creates a predictable temporary file name, which may lead to local denial of service through a symlink attack.
For the stable distribution (etch), this problem has been fixed in version 0.4-9+etch1.
For the upcoming stable distribution (lenny) and the unstable distribution (sid), this problem has been fixed in version 0.4-10.
We recommend that you upgrade your jailer package.
- Fixed in:
-
Debian GNU/Linux 4.0 (etch)
- Source:
- http://security.debian.org/pool/updates/main/j/jailer/jailer_0.4-9+etch1.diff.gz
- http://security.debian.org/pool/updates/main/j/jailer/jailer_0.4.orig.tar.gz
- http://security.debian.org/pool/updates/main/j/jailer/jailer_0.4-9+etch1.dsc
- http://security.debian.org/pool/updates/main/j/jailer/jailer_0.4.orig.tar.gz
- Architecture-independent component:
- http://security.debian.org/pool/updates/main/j/jailer/jailer_0.4-9+etch1_all.deb
MD5 checksums of the listed files are available in the original advisory.