lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20081122105948.GA22242@steve.org.uk>
Date: Sat, 22 Nov 2008 10:59:48 +0000
From: Steve Kemp <skx@...ian.org>
To: bugtraq@...urityfocus.com
Subject: [SECURITY] [DSA 1668-1] New hf packages fix execution of arbitrary code

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
Debian Security Advisory DSA-1668-1                  security@...ian.org
http://www.debian.org/security/                               Steve Kemp
November 22, 2008                     http://www.debian.org/security/faq
- ------------------------------------------------------------------------

Package        : hf
Vulnerability  : programming error
Problem type   : local
Debian-specific: no
CVE Id(s)      : CVE-2008-2378
Debian Bug     : 504182

Steve Kemp discovered that hf, an amateur-radio protocol suite using 
a soundcard as a modem, insecurely tried to execute an external command
which could lead to the elevation of privileges for local users.

For the stable distribution (etch), this problem has been fixed in version
0.7.3-4etch1.

For the unstable distribution (sid), this problem has been fixed in
version 0.8-8.1.

We recommend that you upgrade your hf package.


Upgrade instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 4.0 alias etch
- -------------------------------

Debian (stable)
- ---------------

Stable updates are available for alpha, amd64, arm, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.

Source archives:

  http://security.debian.org/pool/updates/main/h/hf/hf_0.7.3-4etch1.diff.gz
    Size/MD5 checksum:    48134 aedcfbf8d991ebee97c1b1a57f677c32
  http://security.debian.org/pool/updates/main/h/hf/hf_0.7.3.orig.tar.gz
    Size/MD5 checksum:   776437 78d855ea6fccdd5fd1d1ee19d2fd5ea1
  http://security.debian.org/pool/updates/main/h/hf/hf_0.7.3-4etch1.dsc
    Size/MD5 checksum:      665 c225ea8d68cac81421a85f960c26942c

alpha architecture (DEC Alpha)

  http://security.debian.org/pool/updates/main/h/hf/hf_0.7.3-4etch1_alpha.deb
    Size/MD5 checksum:   734206 5bd691c27b46f64ce98c68a48e0798ab

amd64 architecture (AMD x86_64 (AMD64))

  http://security.debian.org/pool/updates/main/h/hf/hf_0.7.3-4etch1_amd64.deb
    Size/MD5 checksum:   690954 c966ca05f946b97569b38c9dccc7a80f

arm architecture (ARM)

  http://security.debian.org/pool/updates/main/h/hf/hf_0.7.3-4etch1_arm.deb
    Size/MD5 checksum:   664202 aad2e7d38d7b6724f2e842e8048bf840

hppa architecture (HP PA RISC)

  http://security.debian.org/pool/updates/main/h/hf/hf_0.7.3-4etch1_hppa.deb
    Size/MD5 checksum:   731050 412d07e8cf470eba24b4a63994d3bb76

i386 architecture (Intel ia32)

  http://security.debian.org/pool/updates/main/h/hf/hf_0.7.3-4etch1_i386.deb
    Size/MD5 checksum:   656534 10eaf8da9cd5deaa7fc0cc655df9e28c

ia64 architecture (Intel ia64)

  http://security.debian.org/pool/updates/main/h/hf/hf_0.7.3-4etch1_ia64.deb
    Size/MD5 checksum:   898636 2caa75fb4af2f56bd5ccfbf5b0387368

mips architecture (MIPS (Big Endian))

  http://security.debian.org/pool/updates/main/h/hf/hf_0.7.3-4etch1_mips.deb
    Size/MD5 checksum:   705444 f41f671e6fc8a5980566c261dc3a6ee9

mipsel architecture (MIPS (Little Endian))

  http://security.debian.org/pool/updates/main/h/hf/hf_0.7.3-4etch1_mipsel.deb
    Size/MD5 checksum:   698476 6e9465ba686b513e22a023f31d4f8980

powerpc architecture (PowerPC)

  http://security.debian.org/pool/updates/main/h/hf/hf_0.7.3-4etch1_powerpc.deb
    Size/MD5 checksum:   689566 3a6b281bb7a0fc7ae0d9bdba1e40dff6

s390 architecture (IBM S/390)

  http://security.debian.org/pool/updates/main/h/hf/hf_0.7.3-4etch1_s390.deb
    Size/MD5 checksum:   661218 315d7ac125355a89b4a6e253a6fb0172

sparc architecture (Sun SPARC/UltraSPARC)

  http://security.debian.org/pool/updates/main/h/hf/hf_0.7.3-4etch1_sparc.deb
    Size/MD5 checksum:   656572 86bb446f37a7801a26859d3db1a177c5


  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@...ts.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFJJ+X2wM/Gs81MDZ0RAvDvAKC2QslfDIGoZ8Kr3KDVFByYDPkEEwCfU8zU
8CxLLsV531z7KaGZJ96QtEM=
=4wBU
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ