[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20081122105948.GA22242@steve.org.uk>
Date: Sat, 22 Nov 2008 10:59:48 +0000
From: Steve Kemp <skx@...ian.org>
To: bugtraq@...urityfocus.com
Subject: [SECURITY] [DSA 1668-1] New hf packages fix execution of arbitrary code
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- ------------------------------------------------------------------------
Debian Security Advisory DSA-1668-1 security@...ian.org
http://www.debian.org/security/ Steve Kemp
November 22, 2008 http://www.debian.org/security/faq
- ------------------------------------------------------------------------
Package : hf
Vulnerability : programming error
Problem type : local
Debian-specific: no
CVE Id(s) : CVE-2008-2378
Debian Bug : 504182
Steve Kemp discovered that hf, an amateur-radio protocol suite using
a soundcard as a modem, insecurely tried to execute an external command
which could lead to the elevation of privileges for local users.
For the stable distribution (etch), this problem has been fixed in version
0.7.3-4etch1.
For the unstable distribution (sid), this problem has been fixed in
version 0.8-8.1.
We recommend that you upgrade your hf package.
Upgrade instructions
- --------------------
wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.
If you are using the apt-get package manager, use the line for
sources.list as given below:
apt-get update
will update the internal database
apt-get upgrade
will install corrected packages
You may use an automated update by adding the resources from the
footer to the proper configuration.
Debian GNU/Linux 4.0 alias etch
- -------------------------------
Debian (stable)
- ---------------
Stable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.
Source archives:
http://security.debian.org/pool/updates/main/h/hf/hf_0.7.3-4etch1.diff.gz
Size/MD5 checksum: 48134 aedcfbf8d991ebee97c1b1a57f677c32
http://security.debian.org/pool/updates/main/h/hf/hf_0.7.3.orig.tar.gz
Size/MD5 checksum: 776437 78d855ea6fccdd5fd1d1ee19d2fd5ea1
http://security.debian.org/pool/updates/main/h/hf/hf_0.7.3-4etch1.dsc
Size/MD5 checksum: 665 c225ea8d68cac81421a85f960c26942c
alpha architecture (DEC Alpha)
http://security.debian.org/pool/updates/main/h/hf/hf_0.7.3-4etch1_alpha.deb
Size/MD5 checksum: 734206 5bd691c27b46f64ce98c68a48e0798ab
amd64 architecture (AMD x86_64 (AMD64))
http://security.debian.org/pool/updates/main/h/hf/hf_0.7.3-4etch1_amd64.deb
Size/MD5 checksum: 690954 c966ca05f946b97569b38c9dccc7a80f
arm architecture (ARM)
http://security.debian.org/pool/updates/main/h/hf/hf_0.7.3-4etch1_arm.deb
Size/MD5 checksum: 664202 aad2e7d38d7b6724f2e842e8048bf840
hppa architecture (HP PA RISC)
http://security.debian.org/pool/updates/main/h/hf/hf_0.7.3-4etch1_hppa.deb
Size/MD5 checksum: 731050 412d07e8cf470eba24b4a63994d3bb76
i386 architecture (Intel ia32)
http://security.debian.org/pool/updates/main/h/hf/hf_0.7.3-4etch1_i386.deb
Size/MD5 checksum: 656534 10eaf8da9cd5deaa7fc0cc655df9e28c
ia64 architecture (Intel ia64)
http://security.debian.org/pool/updates/main/h/hf/hf_0.7.3-4etch1_ia64.deb
Size/MD5 checksum: 898636 2caa75fb4af2f56bd5ccfbf5b0387368
mips architecture (MIPS (Big Endian))
http://security.debian.org/pool/updates/main/h/hf/hf_0.7.3-4etch1_mips.deb
Size/MD5 checksum: 705444 f41f671e6fc8a5980566c261dc3a6ee9
mipsel architecture (MIPS (Little Endian))
http://security.debian.org/pool/updates/main/h/hf/hf_0.7.3-4etch1_mipsel.deb
Size/MD5 checksum: 698476 6e9465ba686b513e22a023f31d4f8980
powerpc architecture (PowerPC)
http://security.debian.org/pool/updates/main/h/hf/hf_0.7.3-4etch1_powerpc.deb
Size/MD5 checksum: 689566 3a6b281bb7a0fc7ae0d9bdba1e40dff6
s390 architecture (IBM S/390)
http://security.debian.org/pool/updates/main/h/hf/hf_0.7.3-4etch1_s390.deb
Size/MD5 checksum: 661218 315d7ac125355a89b4a6e253a6fb0172
sparc architecture (Sun SPARC/UltraSPARC)
http://security.debian.org/pool/updates/main/h/hf/hf_0.7.3-4etch1_sparc.deb
Size/MD5 checksum: 656572 86bb446f37a7801a26859d3db1a177c5
These files will probably be moved into the stable distribution on
its next update.
- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@...ts.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)
iD8DBQFJJ+X2wM/Gs81MDZ0RAvDvAKC2QslfDIGoZ8Kr3KDVFByYDPkEEwCfU8zU
8CxLLsV531z7KaGZJ96QtEM=
=4wBU
-----END PGP SIGNATURE-----
Powered by blists - more mailing lists