---

Debian GNU/Linux Advisories: zblast, pam-pgsql, kdelibs-crypto


Debian Security Advisory DSA 369-1 [email protected]
http://www.debian.org/security/ Matt Zimmerman
August 8th, 2003 http://www.debian.org/security/faq

Package : zblast
Vulnerability : buffer overflow
Problem-Type : local
Debian-specific : no
CVE Ids : CAN-2003-0613

Steve Kemp discovered a buffer overflow in zblast-svgalib, when
saving the high score file. This vulnerability could be exploited
by a local user to gain gid ‘games’, if they can achieve a high
score.

For the current stable distribution (woody) this problem has
been fixed in version 1.2pre-5woody2.

For the unstable distribution (sid) this problem is fixed in
version 1.2.1-7.

We recommend that you update your zblast package.

Upgrade Instructions


wget url

will fetch the file for you
dpkg -i file.deb

will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update

will update the internal database apt-get upgrade

will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 3.0 alias woody


Source archives:


http://security.debian.org/pool/updates/main/z/zblast/zblast_1.2pre-5woody2.dsc

Size/MD5 checksum: 629 342cf492e3784f3a8f28e1ef05b07eaa

http://security.debian.org/pool/updates/main/z/zblast/zblast_1.2pre-5woody2.diff.gz

Size/MD5 checksum: 3168 d318fe30cb889504e505552831e201e6

http://security.debian.org/pool/updates/main/z/zblast/zblast_1.2pre.orig.tar.gz

Size/MD5 checksum: 538922 bce4d51eb69682567b737c5eaa91a9b9

Architecture independent components:


http://security.debian.org/pool/updates/main/z/zblast/zblast-data_1.2pre-5woody2_all.deb

Size/MD5 checksum: 496918 c062e34ee87694546a79880af612dc00

Alpha architecture:


http://security.debian.org/pool/updates/main/z/zblast/zblast-x11_1.2pre-5woody2_alpha.deb

Size/MD5 checksum: 52476 c5d3e1ad4d1836768cd1aa532f7354e6

ARM architecture:


http://security.debian.org/pool/updates/main/z/zblast/zblast-x11_1.2pre-5woody2_arm.deb

Size/MD5 checksum: 42714 f66c9d086d1f150f3daa203cb2f9dd49

Intel IA-32 architecture:


http://security.debian.org/pool/updates/main/z/zblast/zblast-svgalib_1.2pre-5woody2_i386.deb

Size/MD5 checksum: 32632 faa3cdf7051a4184e1b68070d43eac95

http://security.debian.org/pool/updates/main/z/zblast/zblast-x11_1.2pre-5woody2_i386.deb

Size/MD5 checksum: 34932 63302caf4eade00c97be50d29d67d2a7

Intel IA-64 architecture:


http://security.debian.org/pool/updates/main/z/zblast/zblast-x11_1.2pre-5woody2_ia64.deb

Size/MD5 checksum: 57678 50aa16fa917f18b4ca691a3b3959c578

HP Precision architecture:


http://security.debian.org/pool/updates/main/z/zblast/zblast-x11_1.2pre-5woody2_hppa.deb

Size/MD5 checksum: 43698 07a64c5d21272d3cf76dfced0ea20547

Motorola 680×0 architecture:


http://security.debian.org/pool/updates/main/z/zblast/zblast-x11_1.2pre-5woody2_m68k.deb

Size/MD5 checksum: 32034 d40ee60665f8b363835dba5dd4890725

Big endian MIPS architecture:


http://security.debian.org/pool/updates/main/z/zblast/zblast-x11_1.2pre-5woody2_mips.deb

Size/MD5 checksum: 42418 99641d413e7887a9eb4940a3c04442d8

Little endian MIPS architecture:


http://security.debian.org/pool/updates/main/z/zblast/zblast-x11_1.2pre-5woody2_mipsel.deb

Size/MD5 checksum: 42068 3af9a555e17c654a0b434f34a061646e

PowerPC architecture:


http://security.debian.org/pool/updates/main/z/zblast/zblast-x11_1.2pre-5woody2_powerpc.deb

Size/MD5 checksum: 39990 dbbc5ddef8af798e54ff029e21d4334e

IBM S/390 architecture:


http://security.debian.org/pool/updates/main/z/zblast/zblast-x11_1.2pre-5woody2_s390.deb

Size/MD5 checksum: 40606 34a9bf81352557b8e2c1f1927080fd54

Sun Sparc architecture:


http://security.debian.org/pool/updates/main/z/zblast/zblast-x11_1.2pre-5woody2_sparc.deb

Size/MD5 checksum: 41932 bdb32572963ab08f1a4951934b31d23b

These files will probably be moved into the stable distribution
on its next revision.


For apt-get: deb http://security.debian.org/
stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security
dists/stable/updates/main
Mailing list: [email protected]

Package info: `apt-cache show <pkg>’ and http://packages.debian.org/<pkg>


Debian Security Advisory DSA 370-1 [email protected]
http://www.debian.org/security/ Matt Zimmerman
August 8th, 2003 http://www.debian.org/security/faq

Package : pam-pgsql
Vulnerability : format string<</td>
Problem-Type : remote
Debian-specific : no
CVE Ids : CAN-2003-0672

Florian Zumbiehl reported a vulnerability in pam-pgsql whereby
the username to be used for authentication is used as a format
string when writing a log message. This vulnerability may allow an
attacker to execute arbitrary code with the privileges of the
program requesting PAM authentication.

For the stable distribution (woody) this problem has been fixed
in version 0.5.2-3woody1.

For the unstable distribution (sid) this problem has been fixed
in version 0.5.2-7.

We recommend that you update your pam-pgsql package.

Upgrade Instructions


wget url

will fetch the file for you
dpkg -i file.deb

will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update

will update the internal database apt-get upgrade

will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 3.0 alias woody


Source archives:


http://security.debian.org/pool/updates/main/p/pam-pgsql/pam-pgsql_0.5.2-3woody1.dsc

Size/MD5 checksum: 644 01ce86abcdc3a432fc979e1b0f0203a2

http://security.debian.org/pool/updates/main/p/pam-pgsql/pam-pgsql_0.5.2-3woody1.diff.gz

Size/MD5 checksum: 5008 b2be8320b3d2a468b3a5af0fa8bf9e1b

http://security.debian.org/pool/updates/main/p/pam-pgsql/pam-pgsql_0.5.2.orig.tar.gz

Size/MD5 checksum: 39892 3ee046cd64ad9c3e02ad486d0398ad13

Alpha architecture:


http://security.debian.org/pool/updates/main/p/pam-pgsql/libpam-pgsql_0.5.2-3woody1_alpha.deb

Size/MD5 checksum: 15226 c10f5e09cd23810c2418fccfe42414ef

ARM architecture:


http://security.debian.org/pool/updates/main/p/pam-pgsql/libpam-pgsql_0.5.2-3woody1_arm.deb

Size/MD5 checksum: 13602 bf8f9d8244b36ded089b615f2e76d285

Intel IA-32 architecture:


http://security.debian.org/pool/updates/main/p/pam-pgsql/libpam-pgsql_0.5.2-3woody1_i386.deb

Size/MD5 checksum: 13450 b68edd005607062670d4e1280025f27c

Intel IA-64 architecture:


http://security.debian.org/pool/updates/main/p/pam-pgsql/libpam-pgsql_0.5.2-3woody1_ia64.deb

Size/MD5 checksum: 20280 3d755ff713654155613eb28c1fa39077

HP Precision architecture:


http://security.debian.org/pool/updates/main/p/pam-pgsql/libpam-pgsql_0.5.2-3woody1_hppa.deb

Size/MD5 checksum: 14154 7a7ddbd447a3c6470ec281d4ec8a0181

Motorola 680×0 architecture:


http://security.debian.org/pool/updates/main/p/pam-pgsql/libpam-pgsql_0.5.2-3woody1_m68k.deb

Size/MD5 checksum: 13598 db5d0f4711bcae1770230cf026ba0d91

Big endian MIPS architecture:


http://security.debian.org/pool/updates/main/p/pam-pgsql/libpam-pgsql_0.5.2-3woody1_mips.deb

Size/MD5 checksum: 13338 a18e7309983872fec63dc363de4ee97d

Little endian MIPS architecture:


http://security.debian.org/pool/updates/main/p/pam-pgsql/libpam-pgsql_0.5.2-3woody1_mipsel.deb

Size/MD5 checksum: 13354 07b3deb8d49d04d853311746a26b19f4

PowerPC architecture:


http://security.debian.org/pool/updates/main/p/pam-pgsql/libpam-pgsql_0.5.2-3woody1_powerpc.deb

Size/MD5 checksum: 13728 11b9ebcaa2e744acce12e844c59ea893

IBM S/390 architecture:


http://security.debian.org/pool/updates/main/p/pam-pgsql/libpam-pgsql_0.5.2-3woody1_s390.deb

Size/MD5 checksum: 13908 6b285c2dfa13c138155559a92b24e3b1

Sun Sparc architecture:


http://security.debian.org/pool/updates/main/p/pam-pgsql/libpam-pgsql_0.5.2-3woody1_sparc.deb

Size/MD5 checksum: 13556 eb37c53e7fc2084b6883f1c563d6ff92

These files will probably be moved into the stable distribution
on its next revision.


For apt-get: deb http://security.debian.org/
stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security
dists/stable/updates/main
Mailing list: [email protected]

Package info: `apt-cache show <pkg>’ and http://packages.debian.org/<pkg>


Debian Security Advisory DSA 361-2 [email protected]
http://www.debian.org/security/ Matt Zimmerman
August 9th, 2003 http://www.debian.org/security/faq

Package : kdelibs-crypto
Vulnerability : several
Problem-Type : remote
Debian-specific : no
CVE Ids : CAN-2003-0459, CAN-2003-0370

Two vulnerabilities were discovered in kdelibs:

  • – CAN-2003-0459: KDE Konqueror for KDE 3.1.2 and earlier does
    not remove authentication credentials from URLs of the
    “user:password@host” form in the HTTP-Referer header, which could
    allow remote web sites to steal the credentials for pages that link
    to the sites.
  • – CAN-2003-0370: Konqueror Embedded and KDE 2.2.2 and earlier
    does not validate the Common Name (CN) field for X.509
    Certificates, which could allow remote attackers to spoof
    certificates via a man-in-the-middle attack.

These vulnerabilities are described in the following security
advisories from KDE:

http://www.kde.org/info/security/advisory-20030729-1.txt
http://www.kde.org/info/security/advisory-20030602-1.txt

For the current stable distribution (woody) these problems have
been fixed in version 2.2.2-6woody2.

For the unstable distribution (sid) these problems have been
fixed in kdelibs version 4:3.1.3-1.

We recommend that you update your kdelibs-crypto package.

Upgrade Instructions


wget url

will fetch the file for you
dpkg -i file.deb

will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update

will update the internal database apt-get upgrade

will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 3.0 alias woody


Source archives:


http://security.debian.org/pool/updates/main/k/kdelibs-crypto/kdelibs-crypto_2.2.2-6woody2.dsc

Size/MD5 checksum: 717 8599af4329028f8665dabc117e72f76f

http://security.debian.org/pool/updates/main/k/kdelibs-crypto/kdelibs-crypto_2.2.2-6woody2.diff.gz

Size/MD5 checksum: 27879 cb22e341dcb777db3b56965ba3cf6b9c

http://security.debian.org/pool/updates/main/k/kdelibs-crypto/kdelibs-crypto_2.2.2.orig.tar.gz

Size/MD5 checksum: 643622 5ef84fed86c7984f99f8e44e9d5a216a

Alpha architecture:


http://security.debian.org/pool/updates/main/k/kdelibs-crypto/kdelibs3-crypto_2.2.2-6woody2_alpha.deb

Size/MD5 checksum: 132246 23a0d03e1ac5203f225aa0b8dd195d72

ARM architecture:


http://security.debian.org/pool/updates/main/k/kdelibs-crypto/kdelibs3-crypto_2.2.2-6woody2_arm.deb

Size/MD5 checksum: 116806 3d31e16d92ad60db3b91f781dd3cdd5d

Intel IA-32 architecture:


http://security.debian.org/pool/updates/main/k/kdelibs-crypto/kdelibs3-crypto_2.2.2-6woody2_i386.deb

Size/MD5 checksum: 114728 1b922a19c47457e0e82528be473f3225

Intel IA-64 architecture:


http://security.debian.org/pool/updates/main/k/kdelibs-crypto/kdelibs3-crypto_2.2.2-6woody2_ia64.deb

Size/MD5 checksum: 165350 7447f5fa12e93891322d0d9f74d96c8b

HP Precision architecture:


http://security.debian.org/pool/updates/main/k/kdelibs-crypto/kdelibs3-crypto_2.2.2-6woody2_hppa.deb

Size/MD5 checksum: 136022 37906155eecc5a343eb6a799dda29905

Motorola 680×0 architecture:


http://security.debian.org/pool/updates/main/k/kdelibs-crypto/kdelibs3-crypto_2.2.2-6woody2_m68k.deb

Size/MD5 checksum: 113360 39576c3be30cc7f85bb35382c7ffae50

Big endian MIPS architecture:


http://security.debian.org/pool/updates/main/k/kdelibs-crypto/kdelibs3-crypto_2.2.2-6woody2_mips.deb

Size/MD5 checksum: 100388 7bb05d18af371197dca7804cadb20843

Little endian MIPS architecture:


http://security.debian.org/pool/updates/main/k/kdelibs-crypto/kdelibs3-crypto_2.2.2-6woody2_mipsel.deb

Size/MD5 checksum: 99248 34b1cab5af6713de57d7a5fa045b0726

PowerPC architecture:


http://security.debian.org/pool/updates/main/k/kdelibs-crypto/kdelibs3-crypto_2.2.2-6woody2_powerpc.deb

Size/MD5 checksum: 114196 0c9ba9eacb57305e2f4444eff479b0fe

IBM S/390 architecture:


http://security.debian.org/pool/updates/main/k/kdelibs-crypto/kdelibs3-crypto_2.2.2-6woody2_s390.deb

Size/MD5 checksum: 115462 c19494bf3b9e3a3e0314f8094e2e6506

Sun Sparc architecture:


http://security.debian.org/pool/updates/main/k/kdelibs-crypto/kdelibs3-crypto_2.2.2-6woody2_sparc.deb

Size/MD5 checksum: 114624 c29f68f9f7feeff15eef588a57daf671

These files will probably be moved into the stable distribution
on its next revision.


For apt-get: deb http://security.debian.org/
stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security
dists/stable/updates/main
Mailing list: [email protected]

ackage info: `apt-cache show <pkg>’ and http://packages.debian.org/<pkg>

Get the Free Newsletter!

Subscribe to Developer Insider for top news, trends, & analysis