[<prev] [next>] [day] [month] [year] [list]
Message-ID: <m1F1eBC-000pThC__18219.4180124954$1138210240$gmane$org@finlandia.Infodrom.North.DE>
Date: Wed, 25 Jan 2006 07:30:54 +0100 (CET)
From: joey@...odrom.org (Martin Schulze)
To: bugtraq@...urityfocus.com
Subject: [SECURITY] [DSA 954-1] New wine packages fix arbitrary code execution
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- --------------------------------------------------------------------------
Debian Security Advisory DSA 954-1 security@...ian.org
http://www.debian.org/security/ Moritz Muehlenhoff
January 25th, 2006 http://www.debian.org/security/faq
- --------------------------------------------------------------------------
Package : wine
Vulnerability : design flaw
Problem-Type : local (remote)
Debian-specific: no
CVE ID : CVE-2006-0106
Debian Bug : 346197
H D Moore that discovered that Wine, a free implemention of the Microsoft
Windows APIs, inherits a design flaw from the Windows GDI API, which may
lead to the execution of code through GDI escape functions in WMF files.
The old stable distribution (woody) does not seem to be affected by this
problem.
For the stable distribution (sarge) this problem has been fixed in
version 0.0.20050310-1.2.
For the unstable distribution (sid) this problem has been fixed in
version 0.9.2-1.
We recommend that you upgrade your wine packages.
Upgrade Instructions
- --------------------
wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.
If you are using the apt-get package manager, use the line for
sources.list as given below:
apt-get update
will update the internal database
apt-get upgrade
will install corrected packages
You may use an automated update by adding the resources from the
footer to the proper configuration.
Debian GNU/Linux 3.1 alias sarge
- --------------------------------
Source archives:
http://security.debian.org/pool/updates/main/w/wine/wine_0.0.20050310-1.2.dsc
Size/MD5 checksum: 1321 7955ea0c5382fb0bb4649e07ed82f973
http://security.debian.org/pool/updates/main/w/wine/wine_0.0.20050310-1.2.diff.gz
Size/MD5 checksum: 47563 1973d7684bc3accf3c2eb1f4fa3b80be
http://security.debian.org/pool/updates/main/w/wine/wine_0.0.20050310.orig.tar.gz
Size/MD5 checksum: 11798040 d90d31716ba71211af26ac773934f57e
Architecture independent components:
http://security.debian.org/pool/updates/main/w/wine/wine-doc_0.0.20050310-1.2_all.deb
Size/MD5 checksum: 1780636 c78163bfadc872ca47b19c382f360bf2
Intel IA-32 architecture:
http://security.debian.org/pool/updates/main/w/wine/libwine_0.0.20050310-1.2_i386.deb
Size/MD5 checksum: 8069792 90ae35746250507071ca6e8d43d9e647
http://security.debian.org/pool/updates/main/w/wine/libwine-alsa_0.0.20050310-1.2_i386.deb
Size/MD5 checksum: 1128766 38cee9eecc78832a9f8e83385f599d0f
http://security.debian.org/pool/updates/main/w/wine/libwine-arts_0.0.20050310-1.2_i386.deb
Size/MD5 checksum: 1105648 626dbf5ed914d7dfd080a826b275ebf6
http://security.debian.org/pool/updates/main/w/wine/libwine-capi_0.0.20050310-1.2_i386.deb
Size/MD5 checksum: 1094760 10c2c64aee60e0473c61f07de3e772f9
http://security.debian.org/pool/updates/main/w/wine/libwine-dev_0.0.20050310-1.2_i386.deb
Size/MD5 checksum: 2530646 7d1bc36dbb1dfa57d816ba24e135eadd
http://security.debian.org/pool/updates/main/w/wine/libwine-jack_0.0.20050310-1.2_i386.deb
Size/MD5 checksum: 1107820 77e61796adc46f530219502b37e0a86c
http://security.debian.org/pool/updates/main/w/wine/libwine-nas_0.0.20050310-1.2_i386.deb
Size/MD5 checksum: 1102382 af5ef1acdceb8ea0863abd3e6041c825
http://security.debian.org/pool/updates/main/w/wine/libwine-print_0.0.20050310-1.2_i386.deb
Size/MD5 checksum: 1202416 e504f2d0cdd5f5f0187b0c44abbfdcae
http://security.debian.org/pool/updates/main/w/wine/libwine-twain_0.0.20050310-1.2_i386.deb
Size/MD5 checksum: 1104750 4edd3e88a7ae7f4e0dc9a42d127a1de2
http://security.debian.org/pool/updates/main/w/wine/wine_0.0.20050310-1.2_i386.deb
Size/MD5 checksum: 1299408 dbf86414fc89653b4d910d282733e09b
http://security.debian.org/pool/updates/main/w/wine/wine-utils_0.0.20050310-1.2_i386.deb
Size/MD5 checksum: 1659130 7ba1ce62ec17663f390d8b1ea2b45d63
These files will probably be moved into the stable distribution on
its next update.
- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@...ts.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (GNU/Linux)
iD8DBQFD1xsdW5ql+IAeqTIRAnwQAJ9noApACdv35h3jKeg7yw0CzDknYwCfZbpe
tnvRDZkneoFlUSChizlu3rU=
=SvCV
-----END PGP SIGNATURE-----
Powered by blists - more mailing lists