---

Advisories: October 5, 2005

Debian GNU/Linux


Debian Security Advisory DSA 833-2 security@debian.org
http://www.debian.org/security/
Martin Schulze
October 4th, 2005 http://www.debian.org/security/faq


Package : mysql-dfsg-4.1
Vulnerability : buffer overflow
Problem type : remote
Debian-specific: no
CVE ID : CAN-2005-2558
BugTraq ID : 14509

A stack-based buffer overflow in the init_syms function of
MySQL, a popular database, has been discovered that allows remote
authenticated users who can create user-defined functions to
execute arbitrary code via a long function_name field. The ability
to create user-defined functions is not typically granted to
untrusted users.

The following vulnerability matrix explains which version of
MySQL in which distribution has this problem fixed:

  woody sarge sid
mysql 3.23.49-8.14 n/a n/a
mysql-dfsg n/a 4.0.24-10sarge1 4.0.24-10sarge1
mysql-dfsg-4.1 n/a 4.1.11a-4sarge2 4.1.14-2
mysql-dfsg-5.0 n/a n/a 5.0.11beta-3

This update only covers binary packages for the big endian MIPS
architecture that was mysteriously forgotton in the earlier
update.

We recommend that you upgrade your mysql-dfsg-4.1 packages.

Upgrade Instructions


wget url

will fetch the file for you
dpkg -i file.deb

will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update

will update the internal database apt-get upgrade

will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 3.1 alias sarge


Source archives:

    http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/mysql-dfsg-4.1_4.1.11a-4sarge2.dsc

      Size/MD5 checksum: 1021
ef5b7f754fd69c6ddf96185a9ea99d8c
    http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/mysql-dfsg-4.1_4.1.11a-4sarge2.diff.gz

      Size/MD5 checksum: 163217
c22faa82cad1a38568146d03a316b4c3
    http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/mysql-dfsg-4.1_4.1.11a.orig.tar.gz

      Size/MD5 checksum: 15771855
3c0582606a8903e758c2014c2481c7c3

Architecture independent components:

    http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/mysql-common-4.1_4.1.11a-4sarge2_all.deb

      Size/MD5 checksum: 35758
f4c17c57aaed4aba0d06b22391a443ff

Big endian MIPS architecture:

    http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/libmysqlclient14_4.1.11a-4sarge2_mips.deb

      Size/MD5 checksum: 1477872
22fec72fd66a24a4f0d908dcaa23e64f
    http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/libmysqlclient14-dev_4.1.11a-4sarge2_mips.deb

      Size/MD5 checksum: 6051732
6eb05337947f14fc0db2989a64db67d5
    http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/mysql-client-4.1_4.1.11a-4sarge2_mips.deb

      Size/MD5 checksum: 903670
38af0c111d89ed2455f418da9aafdb56
    http://security.debian.org/pool/updates/main/m/mysql-dfsg-4.1/mysql-server-4.1_4.1.11a-4sarge2_mips.deb

      Size/MD5 checksum: 15407526
d728af32519bf4ca50b96dd37998631d

These files will probably be moved into the stable distribution
on its next update.



Debian Security Advisory DSA 839-1 security@debian.org
http://www.debian.org/security/
Martin Schulze
October 4th, 2005 http://www.debian.org/security/faq


Package : apachetop
Vulnerability : insecure temporary file Problem type : local
Debian-specific: no
CVE ID : CAN-2005-2660

Eric Romang discovered an insecurely created temporary file in
apachetop, a realtime monitoring tool for the Apache webserver that
could be exploited with a symlink attack to overwrite arbitrary
files with the user id that runs apachetop.

The old stable distribution (woody) is not affected by this
problem.

For the stable distribution (sarge) this problem has been fixed
in version 0.12.5-1sarge1.

For the unstable distribution (sid) this problem has been fixed
in version 0.12.5-5.

We recommend that you upgrade your apachetop package.

Upgrade Instructions


wget url

will fetch the file for you
dpkg -i file.deb

will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update

will update the internal database apt-get upgrade

will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 3.1 alias sarge


Source archives:

    http://security.debian.org/pool/updates/main/a/apachetop/apachetop_0.12.5-1sarge1.dsc

      Size/MD5 checksum: 613
cf61395747017a6c8a4319be4cbafe83
    http://security.debian.org/pool/updates/main/a/apachetop/apachetop_0.12.5-1sarge1.diff.gz

      Size/MD5 checksum: 2956
76b0826270dcf4c51b191b9aaa3f58f8
    http://security.debian.org/pool/updates/main/a/apachetop/apachetop_0.12.5.orig.tar.gz

      Size/MD5 checksum: 126967
47c40c26319d57100008a2a56dcefe06

Alpha architecture:

    http://security.debian.org/pool/updates/main/a/apachetop/apachetop_0.12.5-1sarge1_alpha.deb

      Size/MD5 checksum: 36262
d532edba02bdf8d4dd2316b68866d906

AMD64 architecture:

    http://security.debian.org/pool/updates/main/a/apachetop/apachetop_0.12.5-1sarge1_amd64.deb

      Size/MD5 checksum: 31370
c8fdae994094269fbe3f597858c8ba14

ARM architecture:

    http://security.debian.org/pool/updates/main/a/apachetop/apachetop_0.12.5-1sarge1_arm.deb

      Size/MD5 checksum: 30572
dc820d6f5af5a89989705c919f5b8bdb

Intel IA-32 architecture:

    http://security.debian.org/pool/updates/main/a/apachetop/apachetop_0.12.5-1sarge1_i386.deb

      Size/MD5 checksum: 30160
cc20d5d7ab5798ec98966b944259fde4

Intel IA-64 architecture:

    http://security.debian.org/pool/updates/main/a/apachetop/apachetop_0.12.5-1sarge1_ia64.deb

      Size/MD5 checksum: 40446
06f813d834fc7566317c94d4ff07c9ff

HP Precision architecture:

    http://security.debian.org/pool/updates/main/a/apachetop/apachetop_0.12.5-1sarge1_hppa.deb

      Size/MD5 checksum: 34332
aea9a750be0952a46d1d03f9b0d8d8cd

Motorola 680×0 architecture:

    http://security.debian.org/pool/updates/main/a/apachetop/apachetop_0.12.5-1sarge1_m68k.deb

      Size/MD5 checksum: 27844
df4e67fb0a58d32537dd4cb7c88c3e24

Big endian MIPS architecture:

    http://security.debian.org/pool/updates/main/a/apachetop/apachetop_0.12.5-1sarge1_mips.deb

      Size/MD5 checksum: 34964
ab8c82dec697e8567a0b819f25ff1c60

Little endian MIPS architecture:

    http://security.debian.org/pool/updates/main/a/apachetop/apachetop_0.12.5-1sarge1_mipsel.deb

      Size/MD5 checksum: 34864
48009e8eb7bf1cac0178d33bed3594e9

PowerPC architecture:

    http://security.debian.org/pool/updates/main/a/apachetop/apachetop_0.12.5-1sarge1_powerpc.deb

      Size/MD5 checksum: 33138
22c5a90df13d862497d4fd0060d2d53a

IBM S/390 architecture:

    http://security.debian.org/pool/updates/main/a/apachetop/apachetop_0.12.5-1sarge1_s390.deb

      Size/MD5 checksum: 31172
120ff918508d38deaf737f22d8a1da96

Sun Sparc architecture:

    http://security.debian.org/pool/updates/main/a/apachetop/apachetop_0.12.5-1sarge1_sparc.deb

      Size/MD5 checksum: 30532
2a5637a3f94148621756e648b0e9cfdb

These files will probably be moved into the stable distribution
on its next update.



Debian Security Advisory DSA 840-1 security@debian.org
http://www.debian.org/security/
Martin Schulze
October 4th, 2005 http://www.debian.org/security/faq


Package : drupal
Vulnerability : missing input sanitising
Problem-Type : remote
Debian-specific: no
CVE ID : CAN-2005-2498

Stefan Esser of the Hardened-PHP Project reported a serious
vulnerablility in the third-party XML-RPC library included with
some Drupal versions. An attacker could execute arbitrary PHP code
on a target site. This update pulls in the latest XML-RPC version
from upstream.

The old stable distribution (woody) is not affected by this
problem since no drupal is included.

For the stable distribution (sarge) this problem has been fixed
in version 4.5.3-4.

For the unstable distribution (sid) this problem has been fixed
in version 4.5.5-1.

We recommend that you upgrade your drupal package.

Upgrade Instructions


wget url

will fetch the file for you
dpkg -i file.deb

will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update

will update the internal database apt-get upgrade

will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 3.1 alias sarge


Source archives:

    http://security.debian.org/pool/updates/main/d/drupal/drupal_4.5.3-4.dsc

      Size/MD5 checksum: 609
eedec6415db7933b2583cd49953a29aa
    http://security.debian.org/pool/updates/main/d/drupal/drupal_4.5.3-4.diff.gz

      Size/MD5 checksum: 70443
877a0f759e9f3443cbf7075d84a4dc91
    http://security.debian.org/pool/updates/main/d/drupal/drupal_4.5.3.orig.tar.gz

      Size/MD5 checksum: 471540
bf093c4c8aca7bba62833ea1df35702f

Architecture independent components:

    http://security.debian.org/pool/updates/main/d/drupal/drupal_4.5.3-4_all.deb

      Size/MD5 checksum: 497672
0fa1c9826ea5d4528369d418c8bae13b

These files will probably be moved into the stable distribution
on its next update.



Debian Security Advisory DSA 841-1 security@debian.org
http://www.debian.org/security/
Martin Schulze
October 4th, 2005 http://www.debian.org/security/faq


Package : mailutils
Vulnerability : format string vulnerability
Problem type : remote
Debian-specific: no
CVE ID : CAN-2005-2878

A format string vulnerability has been discovered in GNU
mailutils which contains utilities for handling mail that allows a
remote attacker to execute arbitrary code on the IMAP server.

The old stable distribution (woody) is not affected by this
problem.

For the stable distribution (sarge) this problem has been fixed
in version 0.6.1-4sarge1.

For the unstable distribution (sid) this problem has been fixed
in version 0.6.90-3.

We recommend that you upgrade your mailutils package.

Upgrade Instructions


wget url

will fetch the file for you
dpkg -i file.deb

will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update

will update the internal database apt-get upgrade

will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 3.1 alias sarge


Source archives:

    http://security.debian.org/pool/updates/main/m/mailutils/mailutils_0.6.1-4sarge1.dsc

      Size/MD5 checksum: 1105
571f9dc4dd73866f6888f7ad40d445a9
    http://security.debian.org/pool/updates/main/m/mailutils/mailutils_0.6.1-4sarge1.diff.gz

      Size/MD5 checksum: 37030
cdeaf9acb33abf47aadeb899163db03c
    http://security.debian.org/pool/updates/main/m/mailutils/mailutils_0.6.1.orig.tar.gz

      Size/MD5 checksum: 3053948
47ff446d55909e2777efb9e912b23de5

Architecture independent components:

    http://security.debian.org/pool/updates/main/m/mailutils/mailutils-doc_0.6.1-4sarge1_all.deb

      Size/MD5 checksum: 287326
f8cc3cd1b4d753c77a49a488768fed4a

Alpha architecture:

    http://security.debian.org/pool/updates/main/m/mailutils/libmailutils0_0.6.1-4sarge1_alpha.deb

      Size/MD5 checksum: 606384
f54df2eb18e6b761feb6e39c5c025898
    http://security.debian.org/pool/updates/main/m/mailutils/libmailutils0-dev_0.6.1-4sarge1_alpha.deb

      Size/MD5 checksum: 538700
4088fade15aa91790a4eeaf968e3deb1
    http://security.debian.org/pool/updates/main/m/mailutils/mailutils_0.6.1-4sarge1_alpha.deb

      Size/MD5 checksum: 171206
ad50d9f2a50366a91134e355764e8db3
    http://security.debian.org/pool/updates/main/m/mailutils/mailutils-comsatd_0.6.1-4sarge1_alpha.deb

      Size/MD5 checksum: 48714
cde882256182f1efc3f65ee5fb8a5a91
    http://security.debian.org/pool/updates/main/m/mailutils/mailutils-imap4d_0.6.1-4sarge1_alpha.deb

      Size/MD5 checksum: 87216
b73d7281c7b568e00a09e6102c2f8bcb
    http://security.debian.org/pool/updates/main/m/mailutils/mailutils-mh_0.6.1-4sarge1_alpha.deb

      Size/MD5 checksum: 840400
a3896dfc973058db179400e793584849
    http://security.debian.org/pool/updates/main/m/mailutils/mailutils-pop3d_0.6.1-4sarge1_alpha.deb

      Size/MD5 checksum: 66522
14ae8401d93659894b73759b1b478f8b

AMD64 architecture:

    http://security.debian.org/pool/updates/main/m/mailutils/libmailutils0_0.6.1-4sarge1_amd64.deb

      Size/MD5 checksum: 572810
6f359d09d1146ca5ba91342cf47e8aed
    http://security.debian.org/pool/updates/main/m/mailutils/libmailutils0-dev_0.6.1-4sarge1_amd64.deb

      Size/MD5 checksum: 419252
63ffc694a1ae01ce93cff42a542a23f5
    http://security.debian.org/pool/updates/main/m/mailutils/mailutils_0.6.1-4sarge1_amd64.deb

      Size/MD5 checksum: 156792
cbf58f684ae6016c66732100bc59549f
    http://security.debian.org/pool/updates/main/m/mailutils/mailutils-comsatd_0.6.1-4sarge1_amd64.deb

      Size/MD5 checksum: 47420
7819e7f8bedf0cb6a9e736cbbad0261b
    http://security.debian.org/pool/updates/main/m/mailutils/mailutils-imap4d_0.6.1-4sarge1_amd64.deb

      Size/MD5 checksum: 80310
c1c891e8de7f71ea1747e7345449bccf
    http://security.debian.org/pool/updates/main/m/mailutils/mailutils-mh_0.6.1-4sarge1_amd64.deb

      Size/MD5 checksum: 747904
b8a99a4c9ba9bd23a2d81c3e8b1873a1
    http://security.debian.org/pool/updates/main/m/mailutils/mailutils-pop3d_0.6.1-4sarge1_amd64.deb

      Size/MD5 checksum: 63066
7fd0d97ddbdd61306a690c5f135c5eac

ARM architecture:

    http://security.debian.org/pool/updates/main/m/mailutils/libmailutils0_0.6.1-4sarge1_arm.deb

      Size/MD5 checksum: 527430
4ddcccc6f44fc7df839b2c028fffe55a
    http://security.debian.org/pool/updates/main/m/mailutils/libmailutils0-dev_0.6.1-4sarge1_arm.deb

      Size/MD5 checksum: 398996
041963fa2132bf8473f119b9a0c46b98
    http://security.debian.org/pool/updates/main/m/mailutils/mailutils_0.6.1-4sarge1_arm.deb

      Size/MD5 checksum: 139946
138bd36d955a0590663691da9a924e87
    http://security.debian.org/pool/updates/main/m/mailutils/mailutils-comsatd_0.6.1-4sarge1_arm.deb

      Size/MD5 checksum: 45920
395f7450d6d6808d9e650dd0191bdc98
    http://security.debian.org/pool/updates/main/m/mailutils/mailutils-imap4d_0.6.1-4sarge1_arm.deb

      Size/MD5 checksum: 73224
3d99823d12f33edbc4ba48a78785c065
    http://security.debian.org/pool/updates/main/m/mailutils/mailutils-mh_0.6.1-4sarge1_arm.deb

      Size/MD5 checksum: 611910
85de420573e56df18b696f99986d2e4e
    http://security.debian.org/pool/updates/main/m/mailutils/mailutils-pop3d_0.6.1-4sarge1_arm.deb

      Size/MD5 checksum: 58728
1713cfbb377dcf306f502766555e2c56

Intel IA-32 architecture:

    http://security.debian.org/pool/updates/main/m/mailutils/libmailutils0_0.6.1-4sarge1_i386.deb

      Size/MD5 checksum: 546638
33c7ba82e32cb44e60ccc11c898350aa
    http://security.debian.org/pool/updates/main/m/mailutils/libmailutils0-dev_0.6.1-4sarge1_i386.deb

      Size/MD5 checksum: 368170
eb33117e3ea1af53f9acb25b91d19802
    http://security.debian.org/pool/updates/main/m/mailutils/mailutils_0.6.1-4sarge1_i386.deb

      Size/MD5 checksum: 143594
e031d8e9c5e66ace4391f915d8505199
    http://security.debian.org/pool/updates/main/m/mailutils/mailutils-comsatd_0.6.1-4sarge1_i386.deb

      Size/MD5 checksum: 46600
4e5ac10b6ccf7ce323d01631da6406db
    http://security.debian.org/pool/updates/main/m/mailutils/mailutils-imap4d_0.6.1-4sarge1_i386.deb

      Size/MD5 checksum: 75060
080e134a5b18a50691573fcb2587ceea
    http://security.debian.org/pool/updates/main/m/mailutils/mailutils-mh_0.6.1-4sarge1_i386.deb

      Size/MD5 checksum: 648372
0b390cfe6f739dc61b964c60b47b5f22
    http://security.debian.org/pool/updates/main/m/mailutils/mailutils-pop3d_0.6.1-4sarge1_i386.deb

      Size/MD5 checksum: 60458
88304f09d9508705d6689ba581380eb6

Intel IA-64 architecture:

    http://security.debian.org/pool/updates/main/m/mailutils/libmailutils0_0.6.1-4sarge1_ia64.deb

      Size/MD5 checksum: 686370
4cb54d890bc50a94b4c86abdbf33eee7
    http://security.debian.org/pool/updates/main/m/mailutils/libmailutils0-dev_0.6.1-4sarge1_ia64.deb

      Size/MD5 checksum: 560412
9ac160e35b8af32107d58726b5b64107
    http://security.debian.org/pool/updates/main/m/mailutils/mailutils_0.6.1-4sarge1_ia64.deb

      Size/MD5 checksum: 198664
ee929d5849173c9ab70928bc61e69bee
    http://security.debian.org/pool/updates/main/m/mailutils/mailutils-comsatd_0.6.1-4sarge1_ia64.deb

      Size/MD5 checksum: 51238
9d39ff55ab465b23b5c661b47ae9630d
    http://security.debian.org/pool/updates/main/m/mailutils/mailutils-imap4d_0.6.1-4sarge1_ia64.deb

      Size/MD5 checksum: 96998
54e94843d30f4eff696ebcdd45c7a539
    http://security.debian.org/pool/updates/main/m/mailutils/mailutils-mh_0.6.1-4sarge1_ia64.deb

      Size/MD5 checksum: 990306
69e8b44efc1925b8ae388b37274b7b82
    http://security.debian.org/pool/updates/main/m/mailutils/mailutils-pop3d_0.6.1-4sarge1_ia64.deb

      Size/MD5 checksum: 72422
245ec7e13466de3d1d43eec6abdb741e

HP Precision architecture:

    http://security.debian.org/pool/updates/main/m/mailutils/libmailutils0_0.6.1-4sarge1_hppa.deb

      Size/MD5 checksum: 595258
d4ca564d255bdc33d1769c1b1063fe8e
    http://security.debian.org/pool/updates/main/m/mailutils/libmailutils0-dev_0.6.1-4sarge1_hppa.deb

      Size/MD5 checksum: 442204
5c238fde3c655bcf043180e90f47172a
    http://security.debian.org/pool/updates/main/m/mailutils/mailutils_0.6.1-4sarge1_hppa.deb

      Size/MD5 checksum: 158120
b8f5748edf06712cb7dce347f93ef407
    http://security.debian.org/pool/updates/main/m/mailutils/mailutils-comsatd_0.6.1-4sarge1_hppa.deb

      Size/MD5 checksum: 47578
6e041420aea5d1edd31c5a34d69bbefa
    http://security.debian.org/pool/updates/main/m/mailutils/mailutils-imap4d_0.6.1-4sarge1_hppa.deb

      Size/MD5 checksum: 79582
9e03d9c6cbfb8ac2381a82c9098d3117
    http://security.debian.org/pool/updates/main/m/mailutils/mailutils-mh_0.6.1-4sarge1_hppa.deb

      Size/MD5 checksum: 743390
8039702fb15714fbf208e593387772ef
    http://security.debian.org/pool/updates/main/m/mailutils/mailutils-pop3d_0.6.1-4sarge1_hppa.deb

      Size/MD5 checksum: 62636
1974df850795b3c8e90f711feed74353

Motorola 680×0 architecture:

    http://security.debian.org/pool/updates/main/m/mailutils/libmailutils0_0.6.1-4sarge1_m68k.deb

      Size/MD5 checksum: 530392
feb5047c2cb1b1aa622ce00f4fa88a8e
    http://security.debian.org/pool/updates/main/m/mailutils/libmailutils0-dev_0.6.1-4sarge1_m68k.deb

      Size/MD5 checksum: 342010
8be136e24deac85778b6aed825eedf4b
    http://security.debian.org/pool/updates/main/m/mailutils/mailutils_0.6.1-4sarge1_m68k.deb

      Size/MD5 checksum: 137976
21192aff6dabf3ce2dd720ac621bdd79
    http://security.debian.org/pool/updates/main/m/mailutils/mailutils-comsatd_0.6.1-4sarge1_m68k.deb

      Size/MD5 checksum: 46002
11524c5af73a9230b396acfbc8ac70ef
    http://security.debian.org/pool/updates/main/m/mailutils/mailutils-imap4d_0.6.1-4sarge1_m68k.deb

      Size/MD5 checksum: 71980
b19b14b7d6fab2d65691841b237535c4
    http://security.debian.org/pool/updates/main/m/mailutils/mailutils-mh_0.6.1-4sarge1_m68k.deb

      Size/MD5 checksum: 585942
96fb6e0b0bd5c77135471137bf4e03f3
    http://security.debian.org/pool/updates/main/m/mailutils/mailutils-pop3d_0.6.1-4sarge1_m68k.deb

      Size/MD5 checksum: 58532
5e08996c218aed9d69df307dc5cfc25c

Big endian MIPS architecture:

    http://security.debian.org/pool/updates/main/m/mailutils/libmailutils0_0.6.1-4sarge1_mips.deb

      Size/MD5 checksum: 546328
fd4c71af25939af23fef5f3264282fb2
    http://security.debian.org/pool/updates/main/m/mailutils/libmailutils0-dev_0.6.1-4sarge1_mips.deb

      Size/MD5 checksum: 435486
3e0e0384e04a09384d770b1ab4baea32
    http://security.debian.org/pool/updates/main/m/mailutils/mailutils_0.6.1-4sarge1_mips.deb

      Size/MD5 checksum: 170178
91bdf8e9f748cc7d59720bde9a2902ea
    http://security.debian.org/pool/updates/main/m/mailutils/mailutils-comsatd_0.6.1-4sarge1_mips.deb

      Size/MD5 checksum: 47324
92c7228dab7e3eef27830516725d92c2
    http://security.debian.org/pool/updates/main/m/mailutils/mailutils-imap4d_0.6.1-4sarge1_mips.deb

      Size/MD5 checksum: 79408
9a53d5edbbde3e22891c17e46d963df4
    http://security.debian.org/pool/updates/main/m/mailutils/mailutils-mh_0.6.1-4sarge1_mips.deb

      Size/MD5 checksum: 736470
05e81cdbde2a46b0390395673a08cc1f
    http://security.debian.org/pool/updates/main/m/mailutils/mailutils-pop3d_0.6.1-4sarge1_mips.deb

      Size/MD5 checksum: 63246
23f641022bea23e89754fcfdbe6a0ee7

Little endian MIPS architecture:

    http://security.debian.org/pool/updates/main/m/mailutils/libmailutils0_0.6.1-4sarge1_mipsel.deb

      Size/MD5 checksum: 543782
d3b0685929f7a7509593070bd6c3cb24
    http://security.debian.org/pool/updates/main/m/mailutils/libmailutils0-dev_0.6.1-4sarge1_mipsel.deb

      Size/MD5 checksum: 435074
0b429dc39083c2f1d297fe74109d9ff1
    http://security.debian.org/pool/updates/main/m/mailutils/mailutils_0.6.1-4sarge1_mipsel.deb

      Size/MD5 checksum: 169236
8f8baa1b0c29f740c6df24eef4be72f4
    http://security.debian.org/pool/updates/main/m/mailutils/mailutils-comsatd_0.6.1-4sarge1_mipsel.deb

      Size/MD5 checksum: 47348
928829f7677458a3a98a172de42845bf
    http://security.debian.org/pool/updates/main/m/mailutils/mailutils-imap4d_0.6.1-4sarge1_mipsel.deb

      Size/MD5 checksum: 79370
af3aac9553ed1b32b5e202be0c5f25ee
    http://security.debian.org/pool/updates/main/m/mailutils/mailutils-mh_0.6.1-4sarge1_mipsel.deb

      Size/MD5 checksum: 733964
4896c6d726bf6bb55ca3799bf16316b1
    http://security.debian.org/pool/updates/main/m/mailutils/mailutils-pop3d_0.6.1-4sarge1_mipsel.deb

      Size/MD5 checksum: 63062
0b6a4acd7abdce23cc5453eb74fe0ace

PowerPC architecture:

    http://security.debian.org/pool/updates/main/m/mailutils/libmailutils0_0.6.1-4sarge1_powerpc.deb

      Size/MD5 checksum: 562656
f67259ab832b0f8c0603cdc67dbe7da5
    http://security.debian.org/pool/updates/main/m/mailutils/libmailutils0-dev_0.6.1-4sarge1_powerpc.deb

      Size/MD5 checksum: 413256
52af6f53afe953e2b61c6963a7767fa4
    http://security.debian.org/pool/updates/main/m/mailutils/mailutils_0.6.1-4sarge1_powerpc.deb

      Size/MD5 checksum: 157132
dbea4cf9d3c13eb64dbfb6c45afc4656
    http://security.debian.org/pool/updates/main/m/mailutils/mailutils-comsatd_0.6.1-4sarge1_powerpc.deb

      Size/MD5 checksum: 48140
a17f9d5f6819a01c43203bba60bd1318
    http://security.debian.org/pool/updates/main/m/mailutils/mailutils-imap4d_0.6.1-4sarge1_powerpc.deb

      Size/MD5 checksum: 77740
a49bb18465fd525432408f04a1a5e2eb
    http://security.debian.org/pool/updates/main/m/mailutils/mailutils-mh_0.6.1-4sarge1_powerpc.deb

      Size/MD5 checksum: 703556
0313c6d7732ea9dc02fdfe761d19d285
    http://security.debian.org/pool/updates/main/m/mailutils/mailutils-pop3d_0.6.1-4sarge1_powerpc.deb

      Size/MD5 checksum: 62720
b872dc38bd68f37eade1d93122b06d5d

IBM S/390 architecture:

    http://security.debian.org/pool/updates/main/m/mailutils/libmailutils0_0.6.1-4sarge1_s390.deb

      Size/MD5 checksum: 588272
9b08cf5bf32808febe51d504f7a1de28
    http://security.debian.org/pool/updates/main/m/mailutils/libmailutils0-dev_0.6.1-4sarge1_s390.deb

      Size/MD5 checksum: 414258
e4dfb8ba1d2c9ae961f4266535b1db13
    http://security.debian.org/pool/updates/main/m/mailutils/mailutils_0.6.1-4sarge1_s390.deb

      Size/MD5 checksum: 156044
e3a2c3bc8577fe048961dfafd65af520
    http://security.debian.org/pool/updates/main/m/mailutils/mailutils-comsatd_0.6.1-4sarge1_s390.deb

      Size/MD5 checksum: 47764
12c866ffaf0c4bdf3e1740b3204159af
    http://security.debian.org/pool/updates/main/m/mailutils/mailutils-imap4d_0.6.1-4sarge1_s390.deb

      Size/MD5 checksum: 80440
972141900eb33f9f5af71f2dbd7735af
    http://security.debian.org/pool/updates/main/m/mailutils/mailutils-mh_0.6.1-4sarge1_s390.deb

      Size/MD5 checksum: 751338
41c5a8f2321793932ed0b656d6d2ab5d
    http://security.debian.org/pool/updates/main/m/mailutils/mailutils-pop3d_0.6.1-4sarge1_s390.deb

      Size/MD5 checksum: 63234
c7c4a9cddd4883057bf48259fc48da4d

Sun Sparc architecture:

    http://security.debian.org/pool/updates/main/m/mailutils/libmailutils0_0.6.1-4sarge1_sparc.deb

      Size/MD5 checksum: 538590
c087d0acbb5aaa85a2a604d502405ef2
    http://security.debian.org/pool/updates/main/m/mailutils/libmailutils0-dev_0.6.1-4sarge1_sparc.deb

      Size/MD5 checksum: 377926
afe33096c3f86adb272ead55253ee886
    http://security.debian.org/pool/updates/main/m/mailutils/mailutils_0.6.1-4sarge1_sparc.deb

      Size/MD5 checksum: 139886
9138582e6bdd999321b9073ed8164b64
    http://security.debian.org/pool/updates/main/m/mailutils/mailutils-comsatd_0.6.1-4sarge1_sparc.deb

      Size/MD5 checksum: 46012
d13c45d9852f0400e61ec550da0f427e
    http://security.debian.org/pool/updates/main/m/mailutils/mailutils-imap4d_0.6.1-4sarge1_sparc.deb

      Size/MD5 checksum: 73622
0ecb0584c1652b26373dd22c457f1a5a
    http://security.debian.org/pool/updates/main/m/mailutils/mailutils-mh_0.6.1-4sarge1_sparc.deb

      Size/MD5 checksum: 624018
ad86570361a60694083e945abd2a5ff6
    http://security.debian.org/pool/updates/main/m/mailutils/mailutils-pop3d_0.6.1-4sarge1_sparc.deb

      Size/MD5 checksum: 58758
b4c553eaee679c961775fcac89cbd168

These files will probably be moved into the stable distribution
on its next update.



Debian Security Advisory DSA 842-1 security@debian.org
http://www.debian.org/security/
Martin Schulze
October 4th, 2005 http://www.debian.org/security/faq


Package : egroupware
Vulnerability : missing input sanitising
Problem type : remote
Debian-specific: no
CVE ID : CAN-2005-2498
Debian Bug : 323350

Stefan Esser discovered a vulnerability in the XML-RPC libraries
which are also present in egroupware, a web-based groupware suite,
that allows injection of arbitrary PHP code into eval()
statements.

The old stable distribution (woody) does not contain egroupware
packages.

For the stable distribution (sarge) this problem has been fixed
in version 1.0.0.007-2.dfsg-2sarge2.

For the unstable distribution (sid) this problem has been fixed
in version 1.0.0.009.dfsg-1.

We recommend that you upgrade your egroupware packages.

Upgrade Instructions


wget url

will fetch the file for you
dpkg -i file.deb

will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update

will update the internal database apt-get upgrade

will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 3.1 alias sarge


Source archives:

    http://security.debian.org/pool/updates/main/e/egroupware/egroupware_1.0.0.007-2.dfsg-2sarge2.dsc

      Size/MD5 checksum: 1285
3d6f6f4ce438e4ebcd70225e9a24e692
    http://security.debian.org/pool/updates/main/e/egroupware/egroupware_1.0.0.007-2.dfsg-2sarge2.diff.gz

      Size/MD5 checksum: 49855
a1739526a8d1c05ddc2dadb47363c8df
    http://security.debian.org/pool/updates/main/e/egroupware/egroupware_1.0.0.007-2.dfsg.orig.tar.gz

      Size/MD5 checksum: 12699187
462f5ea377c4d0c04f16ffe8037b9d6a

Architecture independent components:

    http://security.debian.org/pool/updates/main/e/egroupware/egroupware-addressbook_1.0.0.007-2.dfsg-2sarge2_all.deb

      Size/MD5 checksum: 148852
e750bfd56785d6a940c2a2d88fb94aa2
    http://security.debian.org/pool/updates/main/e/egroupware/egroupware-bookmarks_1.0.0.007-2.dfsg-2sarge2_all.deb

      Size/MD5 checksum: 124982
3ff7fdf44cb275daffeabb48fc0d4308
    http://security.debian.org/pool/updates/main/e/egroupware/egroupware-calendar_1.0.0.007-2.dfsg-2sarge2_all.deb

      Size/MD5 checksum: 382090
787e7db0a8df6cb7ab4b3a80987071ec
    http://security.debian.org/pool/updates/main/e/egroupware/egroupware-comic_1.0.0.007-2.dfsg-2sarge2_all.deb

      Size/MD5 checksum: 255918
79eabb6d2b0174c16fdf966f3ab9e6ee
    http://security.debian.org/pool/updates/main/e/egroupware/egroupware-core_1.0.0.007-2.dfsg-2sarge2_all.deb

      Size/MD5 checksum: 3774984
8289fa81d3b180d5dc67b8a282c8686d
    http://security.debian.org/pool/updates/main/e/egroupware/egroupware-developer-tools_1.0.0.007-2.dfsg-2sarge2_all.deb

      Size/MD5 checksum: 53300
3f2a59360e8bd317eef86d5af7858c1f
    http://security.debian.org/pool/updates/main/e/egroupware/egroupware-email_1.0.0.007-2.dfsg-2sarge2_all.deb

      Size/MD5 checksum: 1243750
161aa84bc1bcf1d4a49499fa5ba0cad3
    http://security.debian.org/pool/updates/main/e/egroupware/egroupware-emailadmin_1.0.0.007-2.dfsg-2sarge2_all.deb

      Size/MD5 checksum: 37960
714cd583a86b9b4b1a8b05c2c9aa0f66
    http://security.debian.org/pool/updates/main/e/egroupware/egroupware-etemplate_1.0.0.007-2.dfsg-2sarge2_all.deb

      Size/MD5 checksum: 1363118
63a866ae67145b939d64db25d0158870
    http://security.debian.org/pool/updates/main/e/egroupware/egroupware-felamimail_1.0.0.007-2.dfsg-2sarge2_all.deb

      Size/MD5 checksum: 275250
2db7b6c8f830f7cb6d00150b33c540da
    http://security.debian.org/pool/updates/main/e/egroupware/egroupware-filemanager_1.0.0.007-2.dfsg-2sarge2_all.deb

      Size/MD5 checksum: 172724
3ce24e53c034d01404d3f7f7158713bc
    http://security.debian.org/pool/updates/main/e/egroupware/egroupware-forum_1.0.0.007-2.dfsg-2sarge2_all.deb

      Size/MD5 checksum: 51170
7797b69c2929da061b6be28b39e268d4
    http://security.debian.org/pool/updates/main/e/egroupware/egroupware-ftp_1.0.0.007-2.dfsg-2sarge2_all.deb

      Size/MD5 checksum: 37888
8c32110dcebcd17859b69587d2b403d4
    http://security.debian.org/pool/updates/main/e/egroupware/egroupware-fudforum_1.0.0.007-2.dfsg-2sarge2_all.deb

      Size/MD5 checksum: 1486376
2ab734c6cdb6f3dad2026afe837d74af
    http://security.debian.org/pool/updates/main/e/egroupware/egroupware-headlines_1.0.0.007-2.dfsg-2sarge2_all.deb

      Size/MD5 checksum: 74774
6a9b286b59af81235d82fcf08f61d04d
    http://security.debian.org/pool/updates/main/e/egroupware/egroupware-infolog_1.0.0.007-2.dfsg-2sarge2_all.deb

      Size/MD5 checksum: 202136
65add5519ec01aa6f280f2f94a7b173c
    http://security.debian.org/pool/updates/main/e/egroupware/egroupware-jinn_1.0.0.007-2.dfsg-2sarge2_all.deb

      Size/MD5 checksum: 204852
2ff54e99c7af6e015e9d97d294525837
    http://security.debian.org/pool/updates/main/e/egroupware/egroupware-ldap_1.0.0.007-2.dfsg-2sarge2_all.deb

      Size/MD5 checksum: 6990
c54a40cb045d634c0291c14a9e0ffc92
    http://security.debian.org/pool/updates/main/e/egroupware/egroupware-manual_1.0.0.007-2.dfsg-2sarge2_all.deb

      Size/MD5 checksum: 17150
c68a5a178735f1a7c6c4c136825fa562
    http://security.debian.org/pool/updates/main/e/egroupware/egroupware-messenger_1.0.0.007-2.dfsg-2sarge2_all.deb

      Size/MD5 checksum: 32010
ad9e7c62d2ab3f682f3270bbc7a71b23
    http://security.debian.org/pool/updates/main/e/egroupware/egroupware-news-admin_1.0.0.007-2.dfsg-2sarge2_all.deb

      Size/MD5 checksum: 50574
316eac825edd3445437794305059a925
    http://security.debian.org/pool/updates/main/e/egroupware/egroupware-phpbrain_1.0.0.007-2.dfsg-2sarge2_all.deb

      Size/MD5 checksum: 119122
c6a4302ed448ee7525fa1cd76953b284
    http://security.debian.org/pool/updates/main/e/egroupware/egroupware-phpldapadmin_1.0.0.007-2.dfsg-2sarge2_all.deb

      Size/MD5 checksum: 139434
7288958a380aa265c387a7318a926f5d
    http://security.debian.org/pool/updates/main/e/egroupware/egroupware-phpsysinfo_1.0.0.007-2.dfsg-2sarge2_all.deb

      Size/MD5 checksum: 115804
3992f299e8a522851680b3f2852f5874
    http://security.debian.org/pool/updates/main/e/egroupware/egroupware-polls_1.0.0.007-2.dfsg-2sarge2_all.deb

      Size/MD5 checksum: 35936
1729874da8403e275ace5d2233e5ef5e
    http://security.debian.org/pool/updates/main/e/egroupware/egroupware-projects_1.0.0.007-2.dfsg-2sarge2_all.deb

      Size/MD5 checksum: 302090
540892c7605cce8c170c35b2ceea89a3
    http://security.debian.org/pool/updates/main/e/egroupware/egroupware-registration_1.0.0.007-2.dfsg-2sarge2_all.deb

      Size/MD5 checksum: 99668
d9ec849c53dce3255b5ffd878a9a78e0
    http://security.debian.org/pool/updates/main/e/egroupware/egroupware-sitemgr_1.0.0.007-2.dfsg-2sarge2_all.deb

      Size/MD5 checksum: 486416
d2b53f213aa3f703eaf8548a16417276
    http://security.debian.org/pool/updates/main/e/egroupware/egroupware-stocks_1.0.0.007-2.dfsg-2sarge2_all.deb

      Size/MD5 checksum: 26374
6820f8f0081f049c381e72e5f48a5cec
    http://security.debian.org/pool/updates/main/e/egroupware/egroupware-tts_1.0.0.007-2.dfsg-2sarge2_all.deb

      Size/MD5 checksum: 92498
8f96075774eabc0351bb7f77180a75f9
    http://security.debian.org/pool/updates/main/e/egroupware/egroupware-wiki_1.0.0.007-2.dfsg-2sarge2_all.deb

      Size/MD5 checksum: 92456
906fc6675229b6ba352b16c32f547b04
    http://security.debian.org/pool/updates/main/e/egroupware/egroupware_1.0.0.007-2.dfsg-2sarge2_all.deb

      Size/MD5 checksum: 4260
d776246f9cd720063d6f89f4ea6851ed

These files will probably be moved into the stable distribution
on its next update.



Debian Security Advisory DSA 843-1

Get the Free Newsletter!

Subscribe to Developer Insider for top news, trends, & analysis