lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  PHC 
Open Source and information security mailing list archives
Hash Suite for Android: free password hash cracker in your pocket
[<prev] [next>] [day] [month] [year] [list]
From: martin.pitt at (Martin Pitt)
Subject: [USN-5-1] gettext vulnerabilities

Ubuntu Security Notice USN-5-1             October 27, 2004
gettext vulnerabilities

A security issue affects the following Ubuntu releases:

Ubuntu 4.10 (Warty Warthog)

The following packages are affected:


The problem can be corrected by upgrading the affected package to
version 0.14.1-2ubuntu0.1. In general, a standard system upgrade is
sufficient to effect the necessary changes.

Details follow:

Recently, Trustix Secure Linux discovered some vulnerabilities in the
gettext package. The programs "autopoint" and "gettextize" created
temporary files in an insecure way, which allowed a symlink attack to
create or overwrite arbitrary files with the privileges of the user
invoking the program.

  Source archives:
      Size/MD5:    82347 e172d137c397dc88ca545acebd40b423
      Size/MD5:      789 d273a3e94446d89f603d16ed9587d00b
      Size/MD5:  6550874 78f4b862510beb2e5d43223dd610e77d

  Architecture independent packages:
      Size/MD5:   638924 610bd9c00f7971f9d359f7a3902db2e4
      Size/MD5:    45340 cf1fc64a65b38622fdbd29e63b538b69

  amd64 architecture (Athlon64, Opteron, EM64T Xeon)
      Size/MD5:    92890 581e614d3c390a0b0c4b52752e03cf75
      Size/MD5:  1576278 a3240029c897fcfac68be7eda1f638bb

  i386 architecture (x86 compatible Intel/AMD)
      Size/MD5:    91066 df2857a4dd7be300743c4e8ec7990997
      Size/MD5:  1549186 d16f720d7ef6e031afab70263394c70a

  powerpc architecture (Apple Macintosh G3/G4/G5)
      Size/MD5:    94174 9f849ed93f64d80fe669603b581b9df3
      Size/MD5:  1590102 cba3d457ded8697c018b3e3ac6853f94
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: Digital signature
Url :

Powered by blists - more mailing lists