Debian Security Advisory DSA 369-1 | [email protected] |
http://www.debian.org/security/ | Matt Zimmerman |
August 8th, 2003 | http://www.debian.org/security/faq |
Package | : | zblast |
Vulnerability | : | buffer overflow |
Problem-Type | : | local |
Debian-specific | : | no |
CVE Ids | : | CAN-2003-0613 |
Steve Kemp discovered a buffer overflow in zblast-svgalib, when
saving the high score file. This vulnerability could be exploited
by a local user to gain gid ‘games’, if they can achieve a high
score.
For the current stable distribution (woody) this problem has
been fixed in version 1.2pre-5woody2.
For the unstable distribution (sid) this problem is fixed in
version 1.2.1-7.
We recommend that you update your zblast package.
Upgrade Instructions
wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.
If you are using the apt-get package manager, use the line for
sources.list as given below:
apt-get update
will update the internal database apt-get upgrade
will install corrected packages
You may use an automated update by adding the resources from the
footer to the proper configuration.
Debian GNU/Linux 3.0 alias woody
Source archives:
http://security.debian.org/pool/updates/main/z/zblast/zblast_1.2pre-5woody2.dsc
Size/MD5 checksum: 629 342cf492e3784f3a8f28e1ef05b07eaa
http://security.debian.org/pool/updates/main/z/zblast/zblast_1.2pre-5woody2.diff.gz
Size/MD5 checksum: 3168 d318fe30cb889504e505552831e201e6
http://security.debian.org/pool/updates/main/z/zblast/zblast_1.2pre.orig.tar.gz
Size/MD5 checksum: 538922 bce4d51eb69682567b737c5eaa91a9b9
Architecture independent components:
http://security.debian.org/pool/updates/main/z/zblast/zblast-data_1.2pre-5woody2_all.deb
Size/MD5 checksum: 496918 c062e34ee87694546a79880af612dc00
Alpha architecture:
http://security.debian.org/pool/updates/main/z/zblast/zblast-x11_1.2pre-5woody2_alpha.deb
Size/MD5 checksum: 52476 c5d3e1ad4d1836768cd1aa532f7354e6
ARM architecture:
http://security.debian.org/pool/updates/main/z/zblast/zblast-x11_1.2pre-5woody2_arm.deb
Size/MD5 checksum: 42714 f66c9d086d1f150f3daa203cb2f9dd49
Intel IA-32 architecture:
http://security.debian.org/pool/updates/main/z/zblast/zblast-svgalib_1.2pre-5woody2_i386.deb
Size/MD5 checksum: 32632 faa3cdf7051a4184e1b68070d43eac95
http://security.debian.org/pool/updates/main/z/zblast/zblast-x11_1.2pre-5woody2_i386.deb
Size/MD5 checksum: 34932 63302caf4eade00c97be50d29d67d2a7
Intel IA-64 architecture:
http://security.debian.org/pool/updates/main/z/zblast/zblast-x11_1.2pre-5woody2_ia64.deb
Size/MD5 checksum: 57678 50aa16fa917f18b4ca691a3b3959c578
HP Precision architecture:
http://security.debian.org/pool/updates/main/z/zblast/zblast-x11_1.2pre-5woody2_hppa.deb
Size/MD5 checksum: 43698 07a64c5d21272d3cf76dfced0ea20547
Motorola 680×0 architecture:
http://security.debian.org/pool/updates/main/z/zblast/zblast-x11_1.2pre-5woody2_m68k.deb
Size/MD5 checksum: 32034 d40ee60665f8b363835dba5dd4890725
Big endian MIPS architecture:
http://security.debian.org/pool/updates/main/z/zblast/zblast-x11_1.2pre-5woody2_mips.deb
Size/MD5 checksum: 42418 99641d413e7887a9eb4940a3c04442d8
Little endian MIPS architecture:
http://security.debian.org/pool/updates/main/z/zblast/zblast-x11_1.2pre-5woody2_mipsel.deb
Size/MD5 checksum: 42068 3af9a555e17c654a0b434f34a061646e
PowerPC architecture:
http://security.debian.org/pool/updates/main/z/zblast/zblast-x11_1.2pre-5woody2_powerpc.deb
Size/MD5 checksum: 39990 dbbc5ddef8af798e54ff029e21d4334e
IBM S/390 architecture:
http://security.debian.org/pool/updates/main/z/zblast/zblast-x11_1.2pre-5woody2_s390.deb
Size/MD5 checksum: 40606 34a9bf81352557b8e2c1f1927080fd54
Sun Sparc architecture:
http://security.debian.org/pool/updates/main/z/zblast/zblast-x11_1.2pre-5woody2_sparc.deb
Size/MD5 checksum: 41932 bdb32572963ab08f1a4951934b31d23b
These files will probably be moved into the stable distribution
on its next revision.
For apt-get: deb http://security.debian.org/
stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security
dists/stable/updates/main
Mailing list: [email protected]
Package info: `apt-cache show <pkg>’ and http://packages.debian.org/<pkg>
Debian Security Advisory DSA 370-1 | [email protected] |
http://www.debian.org/security/ | Matt Zimmerman |
August 8th, 2003 | http://www.debian.org/security/faq |
Package | : | pam-pgsql |
Vulnerability | : | format string<</td> |
Problem-Type | : | remote |
Debian-specific | : | no |
CVE Ids | : | CAN-2003-0672 |
Florian Zumbiehl reported a vulnerability in pam-pgsql whereby
the username to be used for authentication is used as a format
string when writing a log message. This vulnerability may allow an
attacker to execute arbitrary code with the privileges of the
program requesting PAM authentication.
For the stable distribution (woody) this problem has been fixed
in version 0.5.2-3woody1.
For the unstable distribution (sid) this problem has been fixed
in version 0.5.2-7.
We recommend that you update your pam-pgsql package.
Upgrade Instructions
wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.
If you are using the apt-get package manager, use the line for
sources.list as given below:
apt-get update
will update the internal database apt-get upgrade
will install corrected packages
You may use an automated update by adding the resources from the
footer to the proper configuration.
Debian GNU/Linux 3.0 alias woody
Source archives:
http://security.debian.org/pool/updates/main/p/pam-pgsql/pam-pgsql_0.5.2-3woody1.dsc
Size/MD5 checksum: 644 01ce86abcdc3a432fc979e1b0f0203a2
http://security.debian.org/pool/updates/main/p/pam-pgsql/pam-pgsql_0.5.2-3woody1.diff.gz
Size/MD5 checksum: 5008 b2be8320b3d2a468b3a5af0fa8bf9e1b
http://security.debian.org/pool/updates/main/p/pam-pgsql/pam-pgsql_0.5.2.orig.tar.gz
Size/MD5 checksum: 39892 3ee046cd64ad9c3e02ad486d0398ad13
Alpha architecture:
http://security.debian.org/pool/updates/main/p/pam-pgsql/libpam-pgsql_0.5.2-3woody1_alpha.deb
Size/MD5 checksum: 15226 c10f5e09cd23810c2418fccfe42414ef
ARM architecture:
http://security.debian.org/pool/updates/main/p/pam-pgsql/libpam-pgsql_0.5.2-3woody1_arm.deb
Size/MD5 checksum: 13602 bf8f9d8244b36ded089b615f2e76d285
Intel IA-32 architecture:
http://security.debian.org/pool/updates/main/p/pam-pgsql/libpam-pgsql_0.5.2-3woody1_i386.deb
Size/MD5 checksum: 13450 b68edd005607062670d4e1280025f27c
Intel IA-64 architecture:
http://security.debian.org/pool/updates/main/p/pam-pgsql/libpam-pgsql_0.5.2-3woody1_ia64.deb
Size/MD5 checksum: 20280 3d755ff713654155613eb28c1fa39077
HP Precision architecture:
http://security.debian.org/pool/updates/main/p/pam-pgsql/libpam-pgsql_0.5.2-3woody1_hppa.deb
Size/MD5 checksum: 14154 7a7ddbd447a3c6470ec281d4ec8a0181
Motorola 680×0 architecture:
http://security.debian.org/pool/updates/main/p/pam-pgsql/libpam-pgsql_0.5.2-3woody1_m68k.deb
Size/MD5 checksum: 13598 db5d0f4711bcae1770230cf026ba0d91
Big endian MIPS architecture:
http://security.debian.org/pool/updates/main/p/pam-pgsql/libpam-pgsql_0.5.2-3woody1_mips.deb
Size/MD5 checksum: 13338 a18e7309983872fec63dc363de4ee97d
Little endian MIPS architecture:
http://security.debian.org/pool/updates/main/p/pam-pgsql/libpam-pgsql_0.5.2-3woody1_mipsel.deb
Size/MD5 checksum: 13354 07b3deb8d49d04d853311746a26b19f4
PowerPC architecture:
http://security.debian.org/pool/updates/main/p/pam-pgsql/libpam-pgsql_0.5.2-3woody1_powerpc.deb
Size/MD5 checksum: 13728 11b9ebcaa2e744acce12e844c59ea893
IBM S/390 architecture:
http://security.debian.org/pool/updates/main/p/pam-pgsql/libpam-pgsql_0.5.2-3woody1_s390.deb
Size/MD5 checksum: 13908 6b285c2dfa13c138155559a92b24e3b1
Sun Sparc architecture:
http://security.debian.org/pool/updates/main/p/pam-pgsql/libpam-pgsql_0.5.2-3woody1_sparc.deb
Size/MD5 checksum: 13556 eb37c53e7fc2084b6883f1c563d6ff92
These files will probably be moved into the stable distribution
on its next revision.
For apt-get: deb http://security.debian.org/
stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security
dists/stable/updates/main
Mailing list: [email protected]
Package info: `apt-cache show <pkg>’ and http://packages.debian.org/<pkg>
Debian Security Advisory DSA 361-2 | [email protected] |
http://www.debian.org/security/ | Matt Zimmerman |
August 9th, 2003 | http://www.debian.org/security/faq |
Package | : | kdelibs-crypto |
Vulnerability | : | several |
Problem-Type | : | remote |
Debian-specific | : | no |
CVE Ids | : | CAN-2003-0459, CAN-2003-0370 |
Two vulnerabilities were discovered in kdelibs:
- – CAN-2003-0459: KDE Konqueror for KDE 3.1.2 and earlier does
not remove authentication credentials from URLs of the
“user:password@host” form in the HTTP-Referer header, which could
allow remote web sites to steal the credentials for pages that link
to the sites. - – CAN-2003-0370: Konqueror Embedded and KDE 2.2.2 and earlier
does not validate the Common Name (CN) field for X.509
Certificates, which could allow remote attackers to spoof
certificates via a man-in-the-middle attack.
These vulnerabilities are described in the following security
advisories from KDE:
http://www.kde.org/info/security/advisory-20030729-1.txt
http://www.kde.org/info/security/advisory-20030602-1.txt
For the current stable distribution (woody) these problems have
been fixed in version 2.2.2-6woody2.
For the unstable distribution (sid) these problems have been
fixed in kdelibs version 4:3.1.3-1.
We recommend that you update your kdelibs-crypto package.
Upgrade Instructions
wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.
If you are using the apt-get package manager, use the line for
sources.list as given below:
apt-get update
will update the internal database apt-get upgrade
will install corrected packages
You may use an automated update by adding the resources from the
footer to the proper configuration.
Debian GNU/Linux 3.0 alias woody
Source archives:
http://security.debian.org/pool/updates/main/k/kdelibs-crypto/kdelibs-crypto_2.2.2-6woody2.dsc
Size/MD5 checksum: 717 8599af4329028f8665dabc117e72f76f
http://security.debian.org/pool/updates/main/k/kdelibs-crypto/kdelibs-crypto_2.2.2-6woody2.diff.gz
Size/MD5 checksum: 27879 cb22e341dcb777db3b56965ba3cf6b9c
http://security.debian.org/pool/updates/main/k/kdelibs-crypto/kdelibs-crypto_2.2.2.orig.tar.gz
Size/MD5 checksum: 643622 5ef84fed86c7984f99f8e44e9d5a216a
Alpha architecture:
Size/MD5 checksum: 132246 23a0d03e1ac5203f225aa0b8dd195d72
ARM architecture:
http://security.debian.org/pool/updates/main/k/kdelibs-crypto/kdelibs3-crypto_2.2.2-6woody2_arm.deb
Size/MD5 checksum: 116806 3d31e16d92ad60db3b91f781dd3cdd5d
Intel IA-32 architecture:
http://security.debian.org/pool/updates/main/k/kdelibs-crypto/kdelibs3-crypto_2.2.2-6woody2_i386.deb
Size/MD5 checksum: 114728 1b922a19c47457e0e82528be473f3225
Intel IA-64 architecture:
http://security.debian.org/pool/updates/main/k/kdelibs-crypto/kdelibs3-crypto_2.2.2-6woody2_ia64.deb
Size/MD5 checksum: 165350 7447f5fa12e93891322d0d9f74d96c8b
HP Precision architecture:
http://security.debian.org/pool/updates/main/k/kdelibs-crypto/kdelibs3-crypto_2.2.2-6woody2_hppa.deb
Size/MD5 checksum: 136022 37906155eecc5a343eb6a799dda29905
Motorola 680×0 architecture:
http://security.debian.org/pool/updates/main/k/kdelibs-crypto/kdelibs3-crypto_2.2.2-6woody2_m68k.deb
Size/MD5 checksum: 113360 39576c3be30cc7f85bb35382c7ffae50
Big endian MIPS architecture:
http://security.debian.org/pool/updates/main/k/kdelibs-crypto/kdelibs3-crypto_2.2.2-6woody2_mips.deb
Size/MD5 checksum: 100388 7bb05d18af371197dca7804cadb20843
Little endian MIPS architecture:
Size/MD5 checksum: 99248 34b1cab5af6713de57d7a5fa045b0726
PowerPC architecture:
Size/MD5 checksum: 114196 0c9ba9eacb57305e2f4444eff479b0fe
IBM S/390 architecture:
http://security.debian.org/pool/updates/main/k/kdelibs-crypto/kdelibs3-crypto_2.2.2-6woody2_s390.deb
Size/MD5 checksum: 115462 c19494bf3b9e3a3e0314f8094e2e6506
Sun Sparc architecture:
Size/MD5 checksum: 114624 c29f68f9f7feeff15eef588a57daf671
These files will probably be moved into the stable distribution
on its next revision.
For apt-get: deb http://security.debian.org/
stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security
dists/stable/updates/main
Mailing list: [email protected]
ackage info: `apt-cache show <pkg>’ and http://packages.debian.org/<pkg>