lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <m1DppP8-000ofXC@finlandia.Infodrom.North.DE> Date: Tue Jul 5 16:37:20 2005 From: joey at infodrom.org (Martin Schulze) Subject: [SECURITY] [DSA 734-1] New gaim packages fix denial of service -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - -------------------------------------------------------------------------- Debian Security Advisory DSA 734-1 security@...ian.org http://www.debian.org/security/ Martin Schulze July 5th, 2005 http://www.debian.org/security/faq - -------------------------------------------------------------------------- Package : gaim Vulnerability : denial of service Problem-Type : remote Debian-specific: no CVE ID : CAN-2005-1269 CAN-2005-1934 Two denial of service problems have been discovered in Gaim, a multi-protocol instant messaging client. The Common Vulnerabilities and Exposures project identifies the following problems: CAN-2005-1269 A malformed Yahoo filename can result in a crash of the application. CAN-2005-1934 A malformed MSN message can lead to incorrect memory allocation resulting in a crash of the application. The old stable distribution (woody) does not seem to be affected. For the stable distribution (sarge) these problems have been fixed in version 1.2.1-1.3. For the unstable distribution (sid) these problems have been fixed in version 1.3.1-1. We recommend that you upgrade your gaim package. Upgrade Instructions - -------------------- wget url will fetch the file for you dpkg -i file.deb will install the referenced file. If you are using the apt-get package manager, use the line for sources.list as given below: apt-get update will update the internal database apt-get upgrade will install corrected packages You may use an automated update by adding the resources from the footer to the proper configuration. Debian GNU/Linux 3.1 alias sarge - -------------------------------- Source archives: http://security.debian.org/pool/updates/main/g/gaim/gaim_1.2.1-1.3.dsc Size/MD5 checksum: 915 08a8121dcf20f0e36c99468cbaaac002 http://security.debian.org/pool/updates/main/g/gaim/gaim_1.2.1-1.3.diff.gz Size/MD5 checksum: 31431 09e9da9c18435f6d667c6e80c9ab26d0 http://security.debian.org/pool/updates/main/g/gaim/gaim_1.2.1.orig.tar.gz Size/MD5 checksum: 5215565 866598947a30005c9d2a4466c7182e2a Architecture independent components: http://security.debian.org/pool/updates/main/g/gaim/gaim-data_1.2.1-1.3_all.deb Size/MD5 checksum: 2838688 76c3d0b41415b4cb2d1edb3ed1d5f2c1 Alpha architecture: http://security.debian.org/pool/updates/main/g/gaim/gaim_1.2.1-1.3_alpha.deb Size/MD5 checksum: 1068836 99128d827c71cb5a35aeffc9825bc6da http://security.debian.org/pool/updates/main/g/gaim/gaim-dev_1.2.1-1.3_alpha.deb Size/MD5 checksum: 102376 8964c622cba173c9ba8cc8ef7983cf5f ARM architecture: http://security.debian.org/pool/updates/main/g/gaim/gaim_1.2.1-1.3_arm.deb Size/MD5 checksum: 817872 7ee2f80c4b85f8ea12880d2ad0e7621d http://security.debian.org/pool/updates/main/g/gaim/gaim-dev_1.2.1-1.3_arm.deb Size/MD5 checksum: 102396 e9fde25b9022a9deef7fcb261f5244e4 Intel IA-32 architecture: http://security.debian.org/pool/updates/main/g/gaim/gaim_1.2.1-1.3_i386.deb Size/MD5 checksum: 879304 02c7ea4fc0221adf68ba5cdb565577dd http://security.debian.org/pool/updates/main/g/gaim/gaim-dev_1.2.1-1.3_i386.deb Size/MD5 checksum: 102456 a28253b1296809d8b550824071a56e0f Intel IA-64 architecture: http://security.debian.org/pool/updates/main/g/gaim/gaim_1.2.1-1.3_ia64.deb Size/MD5 checksum: 1264300 90f0e5fe37360d51b657b34efb10d1fd http://security.debian.org/pool/updates/main/g/gaim/gaim-dev_1.2.1-1.3_ia64.deb Size/MD5 checksum: 102366 b87cebb6c4baac35150397e410f275ea HP Precision architecture: http://security.debian.org/pool/updates/main/g/gaim/gaim_1.2.1-1.3_hppa.deb Size/MD5 checksum: 1006988 f752b9a1ffe56551ca7be8788cd276e2 http://security.debian.org/pool/updates/main/g/gaim/gaim-dev_1.2.1-1.3_hppa.deb Size/MD5 checksum: 102416 b5fe26c4a7dc7e0f587ffe96303f4573 Motorola 680x0 architecture: http://security.debian.org/pool/updates/main/g/gaim/gaim_1.2.1-1.3_m68k.deb Size/MD5 checksum: 815860 7ee86bf4293389262fa6cfb4fbc67f19 http://security.debian.org/pool/updates/main/g/gaim/gaim-dev_1.2.1-1.3_m68k.deb Size/MD5 checksum: 102492 374e90c3d09183b34d010fcd350ec8c6 Big endian MIPS architecture: http://security.debian.org/pool/updates/main/g/gaim/gaim_1.2.1-1.3_mips.deb Size/MD5 checksum: 855152 dc79ea02eadb95e5c047b73726852079 http://security.debian.org/pool/updates/main/g/gaim/gaim-dev_1.2.1-1.3_mips.deb Size/MD5 checksum: 102436 2d87357f298bb0257fa67feaacb52d81 Little endian MIPS architecture: http://security.debian.org/pool/updates/main/g/gaim/gaim_1.2.1-1.3_mipsel.deb Size/MD5 checksum: 846430 3d45b57cf061fe01ceba0ac0ac1d1e83 http://security.debian.org/pool/updates/main/g/gaim/gaim-dev_1.2.1-1.3_mipsel.deb Size/MD5 checksum: 102378 dc0bd0059286063cc07474fdf59a69b3 PowerPC architecture: http://security.debian.org/pool/updates/main/g/gaim/gaim_1.2.1-1.3_powerpc.deb Size/MD5 checksum: 913466 05eebe5e52d3b6eceacecf46d68fe077 http://security.debian.org/pool/updates/main/g/gaim/gaim-dev_1.2.1-1.3_powerpc.deb Size/MD5 checksum: 102372 046b702811efab2bd95db4ea7d944099 IBM S/390 architecture: http://security.debian.org/pool/updates/main/g/gaim/gaim_1.2.1-1.3_s390.deb Size/MD5 checksum: 946232 876000b9f88e639426c6690ab73740d0 http://security.debian.org/pool/updates/main/g/gaim/gaim-dev_1.2.1-1.3_s390.deb Size/MD5 checksum: 102368 fe438d64fd244c2af559be56fde54090 Sun Sparc architecture: http://security.debian.org/pool/updates/main/g/gaim/gaim_1.2.1-1.3_sparc.deb Size/MD5 checksum: 850740 451213584a4ded0cc848ef96b91aebb0 http://security.debian.org/pool/updates/main/g/gaim/gaim-dev_1.2.1-1.3_sparc.deb Size/MD5 checksum: 102384 62f0b8409fa18b8edcf069c7c59f8279 These files will probably be moved into the stable distribution on its next update. - --------------------------------------------------------------------------------- For apt-get: deb http://security.debian.org/ stable/updates main For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main Mailing list: debian-security-announce@...ts.debian.org Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg> -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.1 (GNU/Linux) iD8DBQFCyqf6W5ql+IAeqTIRAmeDAKCengiiQan3aCAekqoqmlVFpv6iXACeNDiG s6IYAGaMj1EpPOIt6MGomeE= =w+sH -----END PGP SIGNATURE-----
Powered by blists - more mailing lists