lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20091108100737.GA4532@galadriel.inutil.org>
Date: Sun, 8 Nov 2009 11:07:37 +0100
From: Moritz Muehlenhoff <jmm@...ian.org>
To: bugtraq@...urityfocus.com
Subject: [SECURITY] [DSA 1931-1] New NSPR packages fix several vulnerabilities

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- ------------------------------------------------------------------------
Debian Security Advisory DSA-1931-1                  security@...ian.org
http://www.debian.org/security/                       Moritz Muehlenhoff
November 08, 2009                     http://www.debian.org/security/faq
- ------------------------------------------------------------------------

Package        : nspr
Vulnerability  : several
Problem type   : local(remote)
Debian-specific: no
CVE Id(s)      : CVE-2009-1563 CVE-2009-2463

Several vulnerabilities have been discovered in the NetScape Portable
Runtime Library, which may lead to the execution of arbitrary code. The 
Common Vulnerabilities and Exposures project identifies the following 
problems:

CVE-2009-1563

    A programming error in the string handling code may lead to the
    execution of arbitrary code.

CVE-2009-2463

    An integer overflow in the Base64 decoding functions may lead to
    the execution of arbitrary code.

The old stable distribution (etch) doesn't contain nspr.

For the stable distribution (lenny), these problems have been fixed in
version 4.7.1-5.

For the unstable distribution (sid) these problems have been fixed in
version 4.8.2-1.

We recommend that you upgrade your NSPR packages.

Upgrade instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 5.0 alias lenny
- --------------------------------

Stable updates are available for alpha, amd64, arm, armel, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.

Source archives:

  http://security.debian.org/pool/updates/main/n/nspr/nspr_4.7.1.orig.tar.gz
    Size/MD5 checksum:  1258177 55c62ede0e510c6df9bfcc8ac9cffd0c
  http://security.debian.org/pool/updates/main/n/nspr/nspr_4.7.1-5.dsc
    Size/MD5 checksum:     1133 a0ba001408f4751f3c80f02334e188b1
  http://security.debian.org/pool/updates/main/n/nspr/nspr_4.7.1-5.diff.gz
    Size/MD5 checksum:    28285 a3240caf8899d497312ae5f915dd353d

alpha architecture (DEC Alpha)

  http://security.debian.org/pool/updates/main/n/nspr/libnspr4-0d_4.7.1-5_alpha.deb
    Size/MD5 checksum:   145524 a953d83466dc08e5c64f3fac93dcc8c6
  http://security.debian.org/pool/updates/main/n/nspr/libnspr4-0d-dbg_4.7.1-5_alpha.deb
    Size/MD5 checksum:   284688 29fdeff7a43ac466efd2ddec8497dcde
  http://security.debian.org/pool/updates/main/n/nspr/libnspr4-dev_4.7.1-5_alpha.deb
    Size/MD5 checksum:   313328 60eff12d86eef930d01b16ca9bcee432

amd64 architecture (AMD x86_64 (AMD64))

  http://security.debian.org/pool/updates/main/n/nspr/libnspr4-0d_4.7.1-5_amd64.deb
    Size/MD5 checksum:   134452 e8362f7bfb9ad25178fc3b58c8888794
  http://security.debian.org/pool/updates/main/n/nspr/libnspr4-0d-dbg_4.7.1-5_amd64.deb
    Size/MD5 checksum:   290938 1bda17f94f3e960dcdad04772329ad14
  http://security.debian.org/pool/updates/main/n/nspr/libnspr4-dev_4.7.1-5_amd64.deb
    Size/MD5 checksum:   271976 fa0750a3a8762075901a8f06fbf21495

arm architecture (ARM)

  http://security.debian.org/pool/updates/main/n/nspr/libnspr4-0d-dbg_4.7.1-5_arm.deb
    Size/MD5 checksum:   276952 6a072a062f7e9c2db1b43338a3955bdc
  http://security.debian.org/pool/updates/main/n/nspr/libnspr4-0d_4.7.1-5_arm.deb
    Size/MD5 checksum:   119436 89f1a236d10d78229627fd762bc67a3e
  http://security.debian.org/pool/updates/main/n/nspr/libnspr4-dev_4.7.1-5_arm.deb
    Size/MD5 checksum:   255602 9da2dc9c312cf7901f7aeb1f710e507f

armel architecture (ARM EABI)

  http://security.debian.org/pool/updates/main/n/nspr/libnspr4-0d_4.7.1-5_armel.deb
    Size/MD5 checksum:   120734 b71745bf5877be82a349885592037d78
  http://security.debian.org/pool/updates/main/n/nspr/libnspr4-0d-dbg_4.7.1-5_armel.deb
    Size/MD5 checksum:   282114 cc3def69b457c54f2e13bd6c57090477
  http://security.debian.org/pool/updates/main/n/nspr/libnspr4-dev_4.7.1-5_armel.deb
    Size/MD5 checksum:   258072 62328078c188bc87f5039c2e5a9b5674

hppa architecture (HP PA RISC)

  http://security.debian.org/pool/updates/main/n/nspr/libnspr4-0d_4.7.1-5_hppa.deb
    Size/MD5 checksum:   141442 eec30b4a587f8f93eda26b9376bb34e3
  http://security.debian.org/pool/updates/main/n/nspr/libnspr4-0d-dbg_4.7.1-5_hppa.deb
    Size/MD5 checksum:   285916 43fac9fb0eaa79036d9b302db5521781
  http://security.debian.org/pool/updates/main/n/nspr/libnspr4-dev_4.7.1-5_hppa.deb
    Size/MD5 checksum:   279668 db56b3a1adbdedc308936e6ef50f5260

i386 architecture (Intel ia32)

  http://security.debian.org/pool/updates/main/n/nspr/libnspr4-dev_4.7.1-5_i386.deb
    Size/MD5 checksum:   259796 f36c9a52738ee56aedd05e18461e0c1f
  http://security.debian.org/pool/updates/main/n/nspr/libnspr4-0d_4.7.1-5_i386.deb
    Size/MD5 checksum:   124188 adff22c50d9a64ed8bf7b6e2c2edc992
  http://security.debian.org/pool/updates/main/n/nspr/libnspr4-0d-dbg_4.7.1-5_i386.deb
    Size/MD5 checksum:   281648 9896df215653b33de9ce1f8529c1daea

ia64 architecture (Intel ia64)

  http://security.debian.org/pool/updates/main/n/nspr/libnspr4-dev_4.7.1-5_ia64.deb
    Size/MD5 checksum:   331678 5055f6bcbcbb72a48b9c15f21149fee9
  http://security.debian.org/pool/updates/main/n/nspr/libnspr4-0d-dbg_4.7.1-5_ia64.deb
    Size/MD5 checksum:   271188 3e12dcca1457d95601c2d4991e9981f9
  http://security.debian.org/pool/updates/main/n/nspr/libnspr4-0d_4.7.1-5_ia64.deb
    Size/MD5 checksum:   184152 3575ec187b5219f9c71c6eee5a5474a0

mips architecture (MIPS (Big Endian))

  http://security.debian.org/pool/updates/main/n/nspr/libnspr4-0d-dbg_4.7.1-5_mips.deb
    Size/MD5 checksum:   296890 5f45b168d496b884c79bfb5c46462d5f
  http://security.debian.org/pool/updates/main/n/nspr/libnspr4-dev_4.7.1-5_mips.deb
    Size/MD5 checksum:   279162 0b5e93aabae4bfc387c7093153abbec2
  http://security.debian.org/pool/updates/main/n/nspr/libnspr4-0d_4.7.1-5_mips.deb
    Size/MD5 checksum:   126054 5e484999ac3044b87656dd46115f63a1

mipsel architecture (MIPS (Little Endian))

  http://security.debian.org/pool/updates/main/n/nspr/libnspr4-0d-dbg_4.7.1-5_mipsel.deb
    Size/MD5 checksum:   291178 fd5a7aded6225e30eedf987f44a16fea
  http://security.debian.org/pool/updates/main/n/nspr/libnspr4-dev_4.7.1-5_mipsel.deb
    Size/MD5 checksum:   277004 a4f26928866934db999796be4012a7a2
  http://security.debian.org/pool/updates/main/n/nspr/libnspr4-0d_4.7.1-5_mipsel.deb
    Size/MD5 checksum:   125256 71836594904db6f154ac3eb89cbbfddb

powerpc architecture (PowerPC)

  http://security.debian.org/pool/updates/main/n/nspr/libnspr4-dev_4.7.1-5_powerpc.deb
    Size/MD5 checksum:   268738 5daed1f2d5921e736c7f15d6727b8959
  http://security.debian.org/pool/updates/main/n/nspr/libnspr4-0d_4.7.1-5_powerpc.deb
    Size/MD5 checksum:   139154 34b602d43792afbf7f2ccde07d0687bf
  http://security.debian.org/pool/updates/main/n/nspr/libnspr4-0d-dbg_4.7.1-5_powerpc.deb
    Size/MD5 checksum:   292090 e6a310b883c7aa5b6f72bf0cc0683305

s390 architecture (IBM S/390)

  http://security.debian.org/pool/updates/main/n/nspr/libnspr4-dev_4.7.1-5_s390.deb
    Size/MD5 checksum:   275458 50b5bf15fe31a8d6668fe018d7062ad8
  http://security.debian.org/pool/updates/main/n/nspr/libnspr4-0d_4.7.1-5_s390.deb
    Size/MD5 checksum:   142530 b9a983def8be1e116f9736564e49162f
  http://security.debian.org/pool/updates/main/n/nspr/libnspr4-0d-dbg_4.7.1-5_s390.deb
    Size/MD5 checksum:   295420 f3c3352862c2390f8c03724f77cf1158

sparc architecture (Sun SPARC/UltraSPARC)

  http://security.debian.org/pool/updates/main/n/nspr/libnspr4-0d_4.7.1-5_sparc.deb
    Size/MD5 checksum:   119318 cc152c3f1a1f625bfcbc72ea92cdd953
  http://security.debian.org/pool/updates/main/n/nspr/libnspr4-0d-dbg_4.7.1-5_sparc.deb
    Size/MD5 checksum:   266168 55a3913c9d30a8b0c1639e999e4c3582
  http://security.debian.org/pool/updates/main/n/nspr/libnspr4-dev_4.7.1-5_sparc.deb
    Size/MD5 checksum:   253360 d8969537d73b20300591d3d956b5b301


  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@...ts.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)

iEYEARECAAYFAkr2mCoACgkQXm3vHE4uylrFTwCg6nymwrKwSimPGLn8ez207HND
SJIAn3RWaUVn8pgihlPV24nsTumJtFrX
=TWkT
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ