lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <E1E4quF-00033l-LW@mercury.mandriva.com>
Date: Mon, 15 Aug 2005 20:10:23 -0600
From: Mandriva Security Team <security@...driva.com>
To: bugtraq@...urityfocus.com
Subject: MDKSA-2005:139 - Updated gaim packages fix yet more vulnerabilities


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________

                Mandriva Linux Security Update Advisory
 _______________________________________________________________________

 Package name:           gaim
 Advisory ID:            MDKSA-2005:139
 Date:                   August 15th, 2005

 Affected versions:	 10.1, 10.2, Corporate 3.0
 ______________________________________________________________________

 Problem Description:

 Yet more vulnerabilities have been discovered in the gaim IM client. 
 Invalid characters in a sent file can cause Gaim to crash on some
 systems (CAN-2005-2102); a remote AIM or ICQ user can cause a buffer
 overflow in Gaim by setting an away message containing many AIM
 substitution strings (CAN-2005-2103); a memory alignment bug in the
 library used by Gaim to access the Gadu-Gadu network can result in
 a buffer overflow on non-x86 architecture systems (CAN-2005-2370).
 
 These problems have been corrected in gaim 1.5.0 which is provided with
 this update.
 _______________________________________________________________________

 References:

  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2102
  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2103
  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CNA-2005-2370
 ______________________________________________________________________

 Updated Packages:
  
 Mandrakelinux 10.1:
 eae023d3ea9c455993f0f3118a39efe7  10.1/RPMS/gaim-1.5.0-0.1.101mdk.i586.rpm
 022e79c6c6ef153d6ec2c60be3495150  10.1/RPMS/gaim-devel-1.5.0-0.1.101mdk.i586.rpm
 180fbe47e768745cffe981918b00c787  10.1/RPMS/gaim-gevolution-1.5.0-0.1.101mdk.i586.rpm
 f27fd157c744e763dbf131cc50706456  10.1/RPMS/gaim-perl-1.5.0-0.1.101mdk.i586.rpm
 d8fd5b1131755eb60710a068a682d67b  10.1/RPMS/gaim-tcl-1.5.0-0.1.101mdk.i586.rpm
 c3a05a2d53eaccf626681119de32dd48  10.1/RPMS/libgaim-remote0-1.5.0-0.1.101mdk.i586.rpm
 40ef7656bd292a35c0b0a19606f5fbf4  10.1/RPMS/libgaim-remote0-devel-1.5.0-0.1.101mdk.i586.rpm
 c87d6ac4271561d5897e6d0d8789821f  10.1/SRPMS/gaim-1.5.0-0.1.101mdk.src.rpm

 Mandrakelinux 10.1/X86_64:
 c336fce539378546bb2883b5cfd5fd58  x86_64/10.1/RPMS/gaim-1.5.0-0.1.101mdk.x86_64.rpm
 dc651324febed15bf25fe63e089d3ad8  x86_64/10.1/RPMS/gaim-devel-1.5.0-0.1.101mdk.x86_64.rpm
 10dfe256275aa5482325da802a06ccc6  x86_64/10.1/RPMS/gaim-gevolution-1.5.0-0.1.101mdk.x86_64.rpm
 56706dce2dde9072698665ac7956e1dd  x86_64/10.1/RPMS/gaim-perl-1.5.0-0.1.101mdk.x86_64.rpm
 eb9bce3ee007dbb318be873c1b1591d7  x86_64/10.1/RPMS/gaim-tcl-1.5.0-0.1.101mdk.x86_64.rpm
 24df09e5d11bc31dba01407649e2f216  x86_64/10.1/RPMS/lib64gaim-remote0-1.5.0-0.1.101mdk.x86_64.rpm
 44bb0ec8c957f5a3a88d5f3977606570  x86_64/10.1/RPMS/lib64gaim-remote0-devel-1.5.0-0.1.101mdk.x86_64.rpm
 c87d6ac4271561d5897e6d0d8789821f  x86_64/10.1/SRPMS/gaim-1.5.0-0.1.101mdk.src.rpm

 Mandrakelinux 10.2:
 78e555fd3645ebe6b65d597fe4111ce5  10.2/RPMS/gaim-1.5.0-0.1.102mdk.i586.rpm
 5d4075c783b839b23df0b59f36526809  10.2/RPMS/gaim-devel-1.5.0-0.1.102mdk.i586.rpm
 c8261c301e07613f8df955c217cd5959  10.2/RPMS/gaim-gevolution-1.5.0-0.1.102mdk.i586.rpm
 c348d7aec2579dfdeac86fdb8a2b7d56  10.2/RPMS/gaim-perl-1.5.0-0.1.102mdk.i586.rpm
 79aef8848a29533d7ff926bf94768349  10.2/RPMS/gaim-silc-1.5.0-0.1.102mdk.i586.rpm
 cf2bc6595be035c826df355f5694f09b  10.2/RPMS/gaim-tcl-1.5.0-0.1.102mdk.i586.rpm
 569ac4d9ee83efe4215f8e37c433d730  10.2/RPMS/libgaim-remote0-1.5.0-0.1.102mdk.i586.rpm
 3cff6f85a1a4e8b7dfa3e2f3b9aa8183  10.2/RPMS/libgaim-remote0-devel-1.5.0-0.1.102mdk.i586.rpm
 81933632048e345262a031727ccc2f88  10.2/SRPMS/gaim-1.5.0-0.1.102mdk.src.rpm

 Mandrakelinux 10.2/X86_64:
 af600fa897521406d12300a96a3edc5f  x86_64/10.2/RPMS/gaim-1.5.0-0.1.102mdk.x86_64.rpm
 6ffd17bc6ee6eb26a0b4870f548c7e50  x86_64/10.2/RPMS/gaim-devel-1.5.0-0.1.102mdk.x86_64.rpm
 c44e769a69b33d3025bc7657fdbb1741  x86_64/10.2/RPMS/gaim-gevolution-1.5.0-0.1.102mdk.x86_64.rpm
 7f43078544ed57c3455bad5729f260b7  x86_64/10.2/RPMS/gaim-perl-1.5.0-0.1.102mdk.x86_64.rpm
 a583e4aeed9af7e557cb8afe977ff975  x86_64/10.2/RPMS/gaim-silc-1.5.0-0.1.102mdk.x86_64.rpm
 d2df8bad7602db180b62d53aa50baeff  x86_64/10.2/RPMS/gaim-tcl-1.5.0-0.1.102mdk.x86_64.rpm
 5546c3363b33949b09f05b42f14416b9  x86_64/10.2/RPMS/lib64gaim-remote0-1.5.0-0.1.102mdk.x86_64.rpm
 c56ad5acb7ee4350b538fd86262572e0  x86_64/10.2/RPMS/lib64gaim-remote0-devel-1.5.0-0.1.102mdk.x86_64.rpm
 81933632048e345262a031727ccc2f88  x86_64/10.2/SRPMS/gaim-1.5.0-0.1.102mdk.src.rpm

 Corporate 3.0:
 a699d8ab5e69d519041a7123ac905cf6  corporate/3.0/RPMS/gaim-1.5.0-0.1.C30mdk.i586.rpm
 91b9147658a2b3a755b1e6b820b6c173  corporate/3.0/RPMS/gaim-devel-1.5.0-0.1.C30mdk.i586.rpm
 e7bd6d49890ad51c38c3f1a408eafeb0  corporate/3.0/RPMS/gaim-perl-1.5.0-0.1.C30mdk.i586.rpm
 06792dc99f87d5f698dabedad9292627  corporate/3.0/RPMS/gaim-tcl-1.5.0-0.1.C30mdk.i586.rpm
 a654c2eacca5827a2b06d21c5111c0be  corporate/3.0/RPMS/libgaim-remote0-1.5.0-0.1.C30mdk.i586.rpm
 4ecc50f7eecd86d6e45310804eb49e24  corporate/3.0/RPMS/libgaim-remote0-devel-1.5.0-0.1.C30mdk.i586.rpm
 d12b5c04e37be82ed716d43b7f53bf68  corporate/3.0/SRPMS/gaim-1.5.0-0.1.C30mdk.src.rpm

 Corporate 3.0/X86_64:
 446674193e028268a27c6f595644c265  x86_64/corporate/3.0/RPMS/gaim-1.5.0-0.1.C30mdk.x86_64.rpm
 adc0b49cddc2bc09cdfa0876a27aec8d  x86_64/corporate/3.0/RPMS/gaim-devel-1.5.0-0.1.C30mdk.x86_64.rpm
 b5d8baceacef67ba19379d11bad99ecf  x86_64/corporate/3.0/RPMS/gaim-perl-1.5.0-0.1.C30mdk.x86_64.rpm
 2ff79f4094d409df7c2503f58442294f  x86_64/corporate/3.0/RPMS/gaim-tcl-1.5.0-0.1.C30mdk.x86_64.rpm
 90e1f44e9436f54ba16c8ea0ca9c022d  x86_64/corporate/3.0/RPMS/lib64gaim-remote0-1.5.0-0.1.C30mdk.x86_64.rpm
 21c80d62a09a0928f39274a9c957b1a8  x86_64/corporate/3.0/RPMS/lib64gaim-remote0-devel-1.5.0-0.1.C30mdk.x86_64.rpm
 d12b5c04e37be82ed716d43b7f53bf68  x86_64/corporate/3.0/SRPMS/gaim-1.5.0-0.1.C30mdk.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrakeUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (GNU/Linux)

iD8DBQFDAUsPmqjQ0CJFipgRAvoBAKDy387T7TYsr5ldW/gWdI2Zz0OvqgCfXrLr
9t3+vAdNpFzSn/CtFZoui5Y=
=q7kA
-----END PGP SIGNATURE-----


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ