[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20070805200524.GA15362@galadriel.inutil.org>
Date: Sun, 5 Aug 2007 22:05:24 +0200
From: Moritz Muehlenhoff <jmm@...ian.org>
To: debian-security-announce@...ts.debian.org
Subject: [SECURITY] [DSA 1349-1] New libextractor packages
fix arbitrary code execution
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- --------------------------------------------------------------------------
Debian Security Advisory DSA 1349-1 security@...ian.org
http://www.debian.org/security/ Moritz Muehlenhoff
August 5th, 2007 http://www.debian.org/security/faq
- --------------------------------------------------------------------------
Package : libextractor
Vulnerability : integer overflow
Problem type : local (remote)
Debian-specific: no
CVE ID : CVE-2007-3387
It was discovered that an integer overflow in the xpdf PDF viewer may lead
to the execution of arbitrary code if a malformed PDF file is opened.
libextractor includes a copy of the xpdf code and required an update
as well.
For the oldstable distribution (sarge) this problem has been fixed in
version 0.4.2-2sarge6.
The stable distribution (etch) isn't affected by this problem.
The unstable distribution (sid) isn't affected by this problem.
We recommend that you upgrade your libextractor packages.
Upgrade Instructions
- --------------------
wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.
If you are using the apt-get package manager, use the line for
sources.list as given at the end of this advisory:
apt-get update
will update the internal database
apt-get upgrade
will install corrected packages
You may use an automated update by adding the resources from the
footer to the proper configuration.
Debian GNU/Linux 3.1 alias sarge
- --------------------------------
Source archives:
http://security.debian.org/pool/updates/main/libe/libextractor/libextractor_0.4.2-2sarge6.dsc
Size/MD5 checksum: 778 fbcbd62c772674dc96a26373e5aa6e01
http://security.debian.org/pool/updates/main/libe/libextractor/libextractor_0.4.2-2sarge6.diff.gz
Size/MD5 checksum: 9063 bb026f68189fd93686e5fd94b6cda88e
http://security.debian.org/pool/updates/main/libe/libextractor/libextractor_0.4.2.orig.tar.gz
Size/MD5 checksum: 5887095 d99e1b13a017d39700e376a0edbf7ba2
Alpha architecture:
http://security.debian.org/pool/updates/main/libe/libextractor/extract_0.4.2-2sarge6_alpha.deb
Size/MD5 checksum: 19690 01b435b2688d03f3459c79526954925c
http://security.debian.org/pool/updates/main/libe/libextractor/libextractor1_0.4.2-2sarge6_alpha.deb
Size/MD5 checksum: 5810714 dd23f39e0b388296b1fc271739712ebe
http://security.debian.org/pool/updates/main/libe/libextractor/libextractor1-dev_0.4.2-2sarge6_alpha.deb
Size/MD5 checksum: 19484 7f05a34e53fd43830028912e14d2328f
AMD64 architecture:
http://security.debian.org/pool/updates/main/libe/libextractor/extract_0.4.2-2sarge6_amd64.deb
Size/MD5 checksum: 18346 b0630efe8af750547c51f18e2b37e56c
http://security.debian.org/pool/updates/main/libe/libextractor/libextractor1_0.4.2-2sarge6_amd64.deb
Size/MD5 checksum: 5641608 6cc4c3570ed2c3319944d2dadeb32df2
http://security.debian.org/pool/updates/main/libe/libextractor/libextractor1-dev_0.4.2-2sarge6_amd64.deb
Size/MD5 checksum: 17618 b03292795065cdd0c9444343f216a058
ARM architecture:
http://security.debian.org/pool/updates/main/libe/libextractor/extract_0.4.2-2sarge6_arm.deb
Size/MD5 checksum: 17726 b7d8e767fdec15d9f1dd42a4d287d093
http://security.debian.org/pool/updates/main/libe/libextractor/libextractor1_0.4.2-2sarge6_arm.deb
Size/MD5 checksum: 5710926 010de9d5ca245ecde20850f2077ec525
http://security.debian.org/pool/updates/main/libe/libextractor/libextractor1-dev_0.4.2-2sarge6_arm.deb
Size/MD5 checksum: 17034 70da5564ca690372c8ff2f920e3145e7
Intel IA-32 architecture:
http://security.debian.org/pool/updates/main/libe/libextractor/extract_0.4.2-2sarge6_i386.deb
Size/MD5 checksum: 17870 34c81aebd99358f6a6668e6a6e766dcf
http://security.debian.org/pool/updates/main/libe/libextractor/libextractor1_0.4.2-2sarge6_i386.deb
Size/MD5 checksum: 5713546 59647b99f778803ae7dd04b8a3ef4f69
http://security.debian.org/pool/updates/main/libe/libextractor/libextractor1-dev_0.4.2-2sarge6_i386.deb
Size/MD5 checksum: 16796 f6a61702be519be0de6ba5254a8d2bc1
Intel IA-64 architecture:
http://security.debian.org/pool/updates/main/libe/libextractor/extract_0.4.2-2sarge6_ia64.deb
Size/MD5 checksum: 20664 abbab8aca9823e749ce8f56ba180605a
http://security.debian.org/pool/updates/main/libe/libextractor/libextractor1_0.4.2-2sarge6_ia64.deb
Size/MD5 checksum: 5905678 6c4fae9ee6f98f8a2b04dfc8bb1e6c77
http://security.debian.org/pool/updates/main/libe/libextractor/libextractor1-dev_0.4.2-2sarge6_ia64.deb
Size/MD5 checksum: 19402 7217989cd00aa203703636a12b73ef1c
Motorola 680x0 architecture:
http://security.debian.org/pool/updates/main/libe/libextractor/extract_0.4.2-2sarge6_m68k.deb
Size/MD5 checksum: 17432 ad4ed814052b2b16a980916e8c26b4d5
http://security.debian.org/pool/updates/main/libe/libextractor/libextractor1_0.4.2-2sarge6_m68k.deb
Size/MD5 checksum: 5708490 4456e64e983995cdaada1b8003b87de9
http://security.debian.org/pool/updates/main/libe/libextractor/libextractor1-dev_0.4.2-2sarge6_m68k.deb
Size/MD5 checksum: 16664 8d0a17ffea00ef3a8dd84ad1ef751382
Big endian MIPS architecture:
http://security.debian.org/pool/updates/main/libe/libextractor/extract_0.4.2-2sarge6_mips.deb
Size/MD5 checksum: 18672 ca896e1b783faaa7fd4f0b16bd5b679f
http://security.debian.org/pool/updates/main/libe/libextractor/libextractor1_0.4.2-2sarge6_mips.deb
Size/MD5 checksum: 5729468 b4369a7e90e9378aaf16c22e6ee8ba23
http://security.debian.org/pool/updates/main/libe/libextractor/libextractor1-dev_0.4.2-2sarge6_mips.deb
Size/MD5 checksum: 17960 adf6c5dadd298f2cbfb129b329cbd396
Little endian MIPS architecture:
http://security.debian.org/pool/updates/main/libe/libextractor/extract_0.4.2-2sarge6_mipsel.deb
Size/MD5 checksum: 18720 24b4c8c7394ca7600b5d56ff6756ced0
http://security.debian.org/pool/updates/main/libe/libextractor/libextractor1_0.4.2-2sarge6_mipsel.deb
Size/MD5 checksum: 5727182 0d3c4b40711cd5ff424d9c3509abc959
http://security.debian.org/pool/updates/main/libe/libextractor/libextractor1-dev_0.4.2-2sarge6_mipsel.deb
Size/MD5 checksum: 17990 2bfd506c4227ba2b51128ed229d05737
PowerPC architecture:
http://security.debian.org/pool/updates/main/libe/libextractor/extract_0.4.2-2sarge6_powerpc.deb
Size/MD5 checksum: 19840 965842771a493480a596d23219240384
http://security.debian.org/pool/updates/main/libe/libextractor/libextractor1_0.4.2-2sarge6_powerpc.deb
Size/MD5 checksum: 5678172 d9b4e7d752db6ca53ce6adddd1c8963b
http://security.debian.org/pool/updates/main/libe/libextractor/libextractor1-dev_0.4.2-2sarge6_powerpc.deb
Size/MD5 checksum: 17802 9d4275a87460db16bf31e112f8a7be72
IBM S/390 architecture:
http://security.debian.org/pool/updates/main/libe/libextractor/extract_0.4.2-2sarge6_s390.deb
Size/MD5 checksum: 18220 218a8b4f648ee49543981dd7a418a86b
http://security.debian.org/pool/updates/main/libe/libextractor/libextractor1_0.4.2-2sarge6_s390.deb
Size/MD5 checksum: 5768298 367428e42de8d1af622d02d64f4fb027
http://security.debian.org/pool/updates/main/libe/libextractor/libextractor1-dev_0.4.2-2sarge6_s390.deb
Size/MD5 checksum: 18166 98cb43003a7a95dbfd121cf615f73bc8
Sun Sparc architecture:
http://security.debian.org/pool/updates/main/libe/libextractor/extract_0.4.2-2sarge6_sparc.deb
Size/MD5 checksum: 17728 f9220d2e7654b273448c0880374f59d4
http://security.debian.org/pool/updates/main/libe/libextractor/libextractor1_0.4.2-2sarge6_sparc.deb
Size/MD5 checksum: 5752498 5c5bcdf9c749506310e95137ae80550c
http://security.debian.org/pool/updates/main/libe/libextractor/libextractor1-dev_0.4.2-2sarge6_sparc.deb
Size/MD5 checksum: 16938 b90780181aeb323dbcc4dfa11db7bcd0
These files will probably be moved into the stable distribution on
its next update.
- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@...ts.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)
iD8DBQFGti0iXm3vHE4uyloRAoudAJ9ZqS25gbz6VNY/oanVFFjCTMAm6QCgqNhx
XHBRb5puYoKnbq+YL58W5Jc=
=/7L0
-----END PGP SIGNATURE-----
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists