[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20060724174427.GA729@galadriel.inutil.org>
Date: Mon, 24 Jul 2006 19:44:27 +0200
From: Moritz Muehlenhoff <jmm@...ian.org>
To: bugtraq@...urityfocus.com
Subject: [SECURITY] [DSA 1124-1] New fbi packages fix potential deletion of user data
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- --------------------------------------------------------------------------
Debian Security Advisory DSA 1124-1 security@...ian.org
http://www.debian.org/security/ Moritz Muehlenhoff
July 24th, 2006 http://www.debian.org/security/faq
- --------------------------------------------------------------------------
Package : fbi
Vulnerability : typo
Problem-Type : local
Debian-specific: no
CVE ID : CVE-2006-3119
Toth Andras discovered that the fbgs framebuffer postscript/PDF viewer
contains a typo, which prevents the intended filter against malicious
postscript commands from working correctly. This might lead to the
deletion of user data when displaying a postscript file.
For the stable distribution (sarge) this problem has been fixed in
version 2.01-1.2sarge2.
For the unstable distribution (sid) this problem will be fixed soon.
We recommend that you upgrade your fbi package.
Upgrade Instructions
- --------------------
wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.
If you are using the apt-get package manager, use the line for
sources.list as given below:
apt-get update
will update the internal database
apt-get upgrade
will install corrected packages
You may use an automated update by adding the resources from the
footer to the proper configuration.
Debian GNU/Linux 3.1 alias sarge
- --------------------------------
Source archives:
http://security.debian.org/pool/updates/main/f/fbi/fbi_2.01-1.2sarge2.dsc
Size/MD5 checksum: 735 36d0568b3c180e41cb1f6df809ff5e5b
http://security.debian.org/pool/updates/main/f/fbi/fbi_2.01-1.2sarge2.diff.gz
Size/MD5 checksum: 5088 3b4e9623e4aa9d333c3aee47c42f3422
http://security.debian.org/pool/updates/main/f/fbi/fbi_2.01.orig.tar.gz
Size/MD5 checksum: 205822 7bf21eae612fd457155533a83ab075c2
Alpha architecture:
http://security.debian.org/pool/updates/main/f/fbi/exiftran_2.01-1.2sarge2_alpha.deb
Size/MD5 checksum: 29542 b0a4b4a73a93bda7243fea211f5ead9f
http://security.debian.org/pool/updates/main/f/fbi/fbi_2.01-1.2sarge2_alpha.deb
Size/MD5 checksum: 67686 303fed22421dda6d18e541425c6a945f
AMD64 architecture:
http://security.debian.org/pool/updates/main/f/fbi/exiftran_2.01-1.2sarge2_amd64.deb
Size/MD5 checksum: 24528 359cf3eadf6294c39b4fe2b185aa1167
http://security.debian.org/pool/updates/main/f/fbi/fbi_2.01-1.2sarge2_amd64.deb
Size/MD5 checksum: 57384 cb5af6bbe2bd5ea99966eab903f220bf
ARM architecture:
http://security.debian.org/pool/updates/main/f/fbi/exiftran_2.01-1.2sarge2_arm.deb
Size/MD5 checksum: 22494 4a750437cdd4fcb2049e8c33b5231b64
http://security.debian.org/pool/updates/main/f/fbi/fbi_2.01-1.2sarge2_arm.deb
Size/MD5 checksum: 51232 240a6f9509c00477bcbefe80a0fb7e70
Intel IA-32 architecture:
http://security.debian.org/pool/updates/main/f/fbi/exiftran_2.01-1.2sarge2_i386.deb
Size/MD5 checksum: 22712 809f7d0fcfce407e5679305b07b69967
http://security.debian.org/pool/updates/main/f/fbi/fbi_2.01-1.2sarge2_i386.deb
Size/MD5 checksum: 52200 e2b4fdc29c3787d0a843415c5e62bcc1
Intel IA-64 architecture:
http://security.debian.org/pool/updates/main/f/fbi/exiftran_2.01-1.2sarge2_ia64.deb
Size/MD5 checksum: 33896 a60373a4938640174dc80b34c65dadc4
http://security.debian.org/pool/updates/main/f/fbi/fbi_2.01-1.2sarge2_ia64.deb
Size/MD5 checksum: 79814 6b6bfc5816ca014e4d290b05834eceac
HP Precision architecture:
http://security.debian.org/pool/updates/main/f/fbi/exiftran_2.01-1.2sarge2_hppa.deb
Size/MD5 checksum: 26914 164ccc167aa0fda01d9535c65db000cc
http://security.debian.org/pool/updates/main/f/fbi/fbi_2.01-1.2sarge2_hppa.deb
Size/MD5 checksum: 60222 c215390ee5bef416b5a9eb9ad0b16a2e
Motorola 680x0 architecture:
http://security.debian.org/pool/updates/main/f/fbi/exiftran_2.01-1.2sarge2_m68k.deb
Size/MD5 checksum: 20754 006ed3c7e982e08d14860282ac312fad
http://security.debian.org/pool/updates/main/f/fbi/fbi_2.01-1.2sarge2_m68k.deb
Size/MD5 checksum: 47324 63732b97562e3b2e8f801128faf8b8b4
Big endian MIPS architecture:
http://security.debian.org/pool/updates/main/f/fbi/exiftran_2.01-1.2sarge2_mips.deb
Size/MD5 checksum: 26048 211c8a4c5398e403b7d7f4a1a4bb3c4f
http://security.debian.org/pool/updates/main/f/fbi/fbi_2.01-1.2sarge2_mips.deb
Size/MD5 checksum: 59498 6e68121650840d81e04b1bec82156f5c
Little endian MIPS architecture:
http://security.debian.org/pool/updates/main/f/fbi/exiftran_2.01-1.2sarge2_mipsel.deb
Size/MD5 checksum: 26122 74ffc8475a2acf27af99b83b7cd0cbc6
http://security.debian.org/pool/updates/main/f/fbi/fbi_2.01-1.2sarge2_mipsel.deb
Size/MD5 checksum: 59234 6b976898ad8c23b7da53449d6af2c3e0
PowerPC architecture:
http://security.debian.org/pool/updates/main/f/fbi/exiftran_2.01-1.2sarge2_powerpc.deb
Size/MD5 checksum: 25978 ec0d5e88f5e7c908ce7c053485ca415a
http://security.debian.org/pool/updates/main/f/fbi/fbi_2.01-1.2sarge2_powerpc.deb
Size/MD5 checksum: 57298 996b2e6523767b439583dad7c511df83
IBM S/390 architecture:
http://security.debian.org/pool/updates/main/f/fbi/exiftran_2.01-1.2sarge2_s390.deb
Size/MD5 checksum: 24472 8c030047c8d631a6a1c01079e7d352e7
http://security.debian.org/pool/updates/main/f/fbi/fbi_2.01-1.2sarge2_s390.deb
Size/MD5 checksum: 58050 e5bebfa9b1c7ab4a0cfac3bc8f5f4541
Sun Sparc architecture:
http://security.debian.org/pool/updates/main/f/fbi/exiftran_2.01-1.2sarge2_sparc.deb
Size/MD5 checksum: 23074 5c0854fb34e3c6da7c12991dedae0910
http://security.debian.org/pool/updates/main/f/fbi/fbi_2.01-1.2sarge2_sparc.deb
Size/MD5 checksum: 52484 72496fbe05968cfb7bd185414629033f
These files will probably be moved into the stable distribution on
its next update.
- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@...ts.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.3 (GNU/Linux)
iD8DBQFExQaRXm3vHE4uyloRAiQgAJ4qPeQ93sCM0w86nEIW1z7QsRx4ywCgu+ez
4jdvLmA2K7QbRl205/2QqdI=
=79Oc
-----END PGP SIGNATURE-----
Powered by blists - more mailing lists