Debian Security Advisory DSA 325-1 | [email protected] |
http://www.debian.org/security/ | Matt Zimmerman |
June 19th, 2003 | http://www.debian.org/security/faq |
Package | : | eldav |
Vulnerability | : | insecure temporary file |
Problem-Type | : | local |
Debian-specific | : | no |
CVE Ids | : | CAN-2003-0438 |
eldav, a WebDAV client for Emacs, creates temporary files
without taking appropriate security precautions. This vulnerability
could be exploited by a local user to create or overwrite files
with the privileges of the user running emacs and eldav.
For the stable distribution (woody) this problem has been fixed
in version 0.0.20020411-1woody1.
The old stable distribution (potato) does not contain an eldav
package.
For the unstable distribution (sid) this problem has been fixed
in version 0.7.2-1.
We recommend that you update your eldav package.
Upgrade Instructions
wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.
If you are using the apt-get package manager, use the line for
sources.list as given below:
apt-get update
will update the internal database apt-get upgrade
will install corrected packages
You may use an automated update by adding the resources from the
footer to the proper configuration.
Debian GNU/Linux 3.0 alias woody
Source archives:
http://security.debian.org/pool/updates/main/e/eldav/eldav_0.0.20020411-1woody1.dsc
Size/MD5 checksum: 592 9dd06517b53570a595d5c368924ceda1
http://security.debian.org/pool/updates/main/e/eldav/eldav_0.0.20020411-1woody1.diff.gz
Size/MD5 checksum: 3814 c4400b418452e1aea9a115a2af82e1aa
http://security.debian.org/pool/updates/main/e/eldav/eldav_0.0.20020411.orig.tar.gz
Size/MD5 checksum: 12319 3b62e4b9b05eb1c8ef27e9f5d3b98db2
Architecture independent components:
http://security.debian.org/pool/updates/main/e/eldav/eldav_0.0.20020411-1woody1_all.deb
Size/MD5 checksum: 15546 5dc5beca6a1c57b5a4b32968ebc07da4
These files will probably be moved into the stable distribution
on its next revision.
Debian Security Advisory DSA 327-1 | [email protected] |
http://www.debian.org/security/ | Matt Zimmerman |
June 19th, 2003 | http://www.debian.org/security/faq |
Package | : | xbl |
Vulnerability | : | buffer overflows |
Problem-Type | : | local |
Debian-specific | : | no |
Steve Kemp discovered several buffer overflows in xbl, a game,
which can be triggered by long command line arguments. This
vulnerability could be exploited by a local attacker to gain gid
‘games’.
For the stable distribution (woody) this problem has been fixed
in version 1.0k-3woody1.
For the old stable distribution (potato) this problem has been
fixed in version 1.0i-7potato1.
For the unstable distribution (sid) this problem is fixed in
version 1.0k-5.
We recommend that you update your xbl package.
Upgrade Instructions
wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.
If you are using the apt-get package manager, use the line for
sources.list as given below:
apt-get update
will update the internal database apt-get upgrade
will install corrected packages
You may use an automated update by adding the resources from the
footer to the proper configuration.
Debian GNU/Linux 2.2 alias potato
Source archives:
http://security.debian.org/pool/updates/main/x/xbl/xbl_1.0i-7potato1.dsc
Size/MD5 checksum: 554 d4b156eca0f35de954bd913bcd189b3e
http://security.debian.org/pool/updates/main/x/xbl/xbl_1.0i-7potato1.diff.gz
Size/MD5 checksum: 7844 a55498b9b859c7a71744e9e9e1752af3
http://security.debian.org/pool/updates/main/x/xbl/xbl_1.0i.orig.tar.gz
Size/MD5 checksum: 213223 b9ea1555044e7ca80ff781796fd867b1
Alpha architecture:
http://security.debian.org/pool/updates/main/x/xbl/xbl_1.0i-7potato1_alpha.deb
Size/MD5 checksum: 120714 dc4849970e1a724b4387e7f3f07dc820
ARM architecture:
http://security.debian.org/pool/updates/main/x/xbl/xbl_1.0i-7potato1_arm.deb
Size/MD5 checksum: 104536 74d0a2c7da8e14e1b7f425f31ab6f5d8
Intel IA-32 architecture:
http://security.debian.org/pool/updates/main/x/xbl/xbl_1.0i-7potato1_i386.deb
Size/MD5 checksum: 100054 3ef40d75316e7f455868fa23f40712d9
Motorola 680×0 architecture:
http://security.debian.org/pool/updates/main/x/xbl/xbl_1.0i-7potato1_m68k.deb
Size/MD5 checksum: 96526 22868d833d5b1ff7616709516ca91750
PowerPC architecture:
http://security.debian.org/pool/updates/main/x/xbl/xbl_1.0i-7potato1_powerpc.deb
Size/MD5 checksum: 108338 1bf1e03fcde2d23aa7c6bcfa751899db
Sun Sparc architecture:
http://security.debian.org/pool/updates/main/x/xbl/xbl_1.0i-7potato1_sparc.deb
Size/MD5 checksum: 107850 339f2a39f75c73d1eafd0bf20216bc95
Debian GNU/Linux 3.0 alias woody
Source archives:
http://security.debian.org/pool/updates/main/x/xbl/xbl_1.0k-3woody1.dsc
Size/MD5 checksum: 566 a25e8ecf19edb97ab3cc32d52f20712f
http://security.debian.org/pool/updates/main/x/xbl/xbl_1.0k-3woody1.diff.gz
Size/MD5 checksum: 9244 2376e2e1b69d0d79f0b0c0f87fe99a73
http://security.debian.org/pool/updates/main/x/xbl/xbl_1.0k.orig.tar.gz
Size/MD5 checksum: 135080 22e7822a449ae5b68695158fd59ea49c
Alpha architecture:
http://security.debian.org/pool/updates/main/x/xbl/xbl_1.0k-3woody1_alpha.deb
Size/MD5 checksum: 122224 ef6d29658f10a304876a2f17660b92a4
ARM architecture:
http://security.debian.org/pool/updates/main/x/xbl/xbl_1.0k-3woody1_arm.deb
Size/MD5 checksum: 111094 d02b8e87910b0c410698430110eb4609
Intel IA-32 architecture:
http://security.debian.org/pool/updates/main/x/xbl/xbl_1.0k-3woody1_i386.deb
Size/MD5 checksum: 103230 91c87f285064777b556e60a41b5d137e
Intel IA-64 architecture:
http://security.debian.org/pool/updates/main/x/xbl/xbl_1.0k-3woody1_ia64.deb
Size/MD5 checksum: 151410 f01344cab1623a36565d7ccae04ff20c
HP Precision architecture:
http://security.debian.org/pool/updates/main/x/xbl/xbl_1.0k-3woody1_hppa.deb
Size/MD5 checksum: 116734 8ba40022bd13b071ce9832879bc00057
Motorola 680×0 architecture:
http://security.debian.org/pool/updates/main/x/xbl/xbl_1.0k-3woody1_m68k.deb
Size/MD5 checksum: 97730 5d8d438bd00e9f82b84a42f2d9797141
Big endian MIPS architecture:
http://security.debian.org/pool/updates/main/x/xbl/xbl_1.0k-3woody1_mips.deb
Size/MD5 checksum: 115968 161ebcca8ea2a4adb31ecad81c151ee1
Little endian MIPS architecture:
http://security.debian.org/pool/updates/main/x/xbl/xbl_1.0k-3woody1_mipsel.deb
Size/MD5 checksum: 115830 59b4a9b21a0658d6fc1f4b42d599f91d
PowerPC architecture:
http://security.debian.org/pool/updates/main/x/xbl/xbl_1.0k-3woody1_powerpc.deb
Size/MD5 checksum: 112202 69b74ea9a5fb019dbcd56051789c8970
IBM S/390 architecture:
http://security.debian.org/pool/updates/main/x/xbl/xbl_1.0k-3woody1_s390.deb
Size/MD5 checksum: 106190 59e14cbb58a28db14639bba8a3c0c802
Sun Sparc architecture:
http://security.debian.org/pool/updates/main/x/xbl/xbl_1.0k-3woody1_sparc.deb
Size/MD5 checksum: 111194 b67bf2b0ba2174935b2ef85ca45a28a3
These files will probably be moved into the stable distribution
on its next revision.
Debian Security Advisory DSA 328-1 | [email protected] |
http://www.debian.org/security/ | Matt Zimmerman |
June 19th, 2003 | http://www.debian.org/security/faq |
Package | : | webfs |
Vulnerability | : | buffer overflow |
Problem-Type | : | remote |
Debian-specific | : | no |
CVE Id | : | CAN-2003-0445 |
webfs, a lightweight HTTP server for static content, contains a
buffer overflow whereby a long Request-URI in an HTTP request could
cause arbitrary code to be executed.
For the stable distribution (woody) this problem has been fixed
in version 1.17.1.
The old stable distribution (potato) does not contain a webfs
package.
For the unstable distribution (sid) this problem will be fixed
soon.
We recommend that you update your webfs package.
Upgrade Instructions
wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.
If you are using the apt-get package manager, use the line for
sources.list as given below:
apt-get update
will update the internal database apt-get upgrade
will install corrected packages
You may use an automated update by adding the resources from the
footer to the proper configuration.
Debian GNU/Linux 3.0 alias woody
Source archives:
http://security.debian.org/pool/updates/main/w/webfs/webfs_1.17.1.dsc
Size/MD5 checksum: 472 ebff11ea33e3a2692c8d11b2b42fbe51
http://security.debian.org/pool/updates/main/w/webfs/webfs_1.17.1.tar.gz
Size/MD5 checksum: 40979 6cd1419cd680e0dedaaddf8d5b1f6014
Alpha architecture:
http://security.debian.org/pool/updates/main/w/webfs/webfs_1.17.1_alpha.deb
Size/MD5 checksum: 37058 ceadb6ced7463c646f826c6894766d65
ARM architecture:
http://security.debian.org/pool/updates/main/w/webfs/webfs_1.17.1_arm.deb
Size/MD5 checksum: 34050 f00275e59fdbf15cf1fa1f56f18f552d
Intel IA-32 architecture:
http://security.debian.org/pool/updates/main/w/webfs/webfs_1.17.1_i386.deb
Size/MD5 checksum: 32366 cc87f8da127a490e718cbd53a91b22ae
Intel IA-64 architecture:
http://security.debian.org/pool/updates/main/w/webfs/webfs_1.17.1_ia64.deb
Size/MD5 checksum: 45388 f97e46167c401f1ed8d8772d2e69a3c8
HP Precision architecture:
http://security.debian.org/pool/updates/main/w/webfs/webfs_1.17.1_hppa.deb
Size/MD5 checksum: 35414 8e21ab1df89efb46ffc93f46e25551db
Motorola 680×0 architecture:
http://security.debian.org/pool/updates/main/w/webfs/webfs_1.17.1_m68k.deb
Size/MD5 checksum: 31020 77084aa2f8a1b5387375161ada8a3fbc
Big endian MIPS architecture:
http://security.debian.org/pool/updates/main/w/webfs/webfs_1.17.1_mips.deb
Size/MD5 checksum: 34576 0ca14889e9837081ca8c16d649b10ff9
Little endian MIPS architecture:
http://security.debian.org/pool/updates/main/w/webfs/webfs_1.17.1_mipsel.deb
Size/MD5 checksum: 34560 edd5ce2fe5aed50645c7e2b6bef38933
PowerPC architecture:
http://security.debian.org/pool/updates/main/w/webfs/webfs_1.17.1_powerpc.deb
Size/MD5 checksum: 33204 d7cb83a6b91e1ffd037b799a9da81ad1
IBM S/390 architecture:
http://security.debian.org/pool/updates/main/w/webfs/webfs_1.17.1_s390.deb
Size/MD5 checksum: 34376 c48ec81b893a28988b51cdf216925341
Sun Sparc architecture:
http://security.debian.org/pool/updates/main/w/webfs/webfs_1.17.1_sparc.deb
Size/MD5 checksum: 36380 ce67a09910792ed48a4b9f887d80478d
These files will probably be moved into the stable distribution
on its next revision.
Debian Security Advisory DSA 329-1 | [email protected] |
http://www.debian.org/security/ | Matt Zimmerman |
June 20th, 2003 | http://www.debian.org/security/faq |
Package | : | osh |
Vulnerability | : | buffer overflows |
Problem-Type | : | local |
Debian-specific | : | no |
Steve Kemp discovered that osh, a shell intended to restrict the
actions of the user, contains two buffer overflows, in processing
environment variables and file redirections. These vulnerabilities
could be used to execute arbitrary code, overriding any
restrictions placed on the shell.
For the stable distribution (woody) this problem has been fixed
in version 1.7-11woody1.
The old stable distribution (potato) is affected by this
problem, and may be fixed in a future advisory on a time-available
basis.
For the unstable distribution (sid) this problem is fixed in
version 1.7-12.
We recommend that you update your osh package.
Upgrade Instructions
wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.
If you are using the apt-get package manager, use the line for
sources.list as given below:
apt-get update
will update the internal database apt-get upgrade
will install corrected packages
You may use an automated update by adding the resources from the
footer to the proper configuration.
Debian GNU/Linux 3.0 alias woody
Source archives:
http://security.debian.org/pool/updates/main/o/osh/osh_1.7-11woody1.dsc
Size/MD5 checksum: 565 3af7f1c0c6a346d204c379b1a0c76239
http://security.debian.org/pool/updates/main/o/osh/osh_1.7-11woody1.diff.gz
Size/MD5 checksum: 11456 50c1a6f3a14d5a9a87a0903d01e40f82
Alpha architecture:
http://security.debian.org/pool/updates/main/o/osh/osh_1.7-11woody1_alpha.deb
Size/MD5 checksum: 33018 b655c662609b7bb5062a20b657a17a4c
ARM architecture:
http://security.debian.org/pool/updates/main/o/osh/osh_1.7-11woody1_arm.deb
Size/MD5 checksum: 27164 1f47067f854ca6997eaf5c1dde43f80d
Intel IA-32 architecture:
http://security.debian.org/pool/updates/main/o/osh/osh_1.7-11woody1_i386.deb
Size/MD5 checksum: 26734 dc76617c5ba84467187da2ef53b6b5b9
Intel IA-64 architecture:
http://security.debian.org/pool/updates/main/o/osh/osh_1.7-11woody1_ia64.deb
Size/MD5 checksum: 36458 6611963c875df296cc82331a0d4ac5af
HP Precision architecture:
http://security.debian.org/pool/updates/main/o/osh/osh_1.7-11woody1_hppa.deb
Size/MD5 checksum: 29144 5a16455ee0e50519b006010748d8e3b8
Motorola 680×0 architecture:
http://security.debian.org/pool/updates/main/o/osh/osh_1.7-11woody1_m68k.deb
Size/MD5 checksum: 26014 8d8cfaa42fa540c7dc3e74e80a96e4a6
Big endian MIPS architecture:
http://security.debian.org/pool/updates/main/o/osh/osh_1.7-11woody1_mips.deb
Size/MD5 checksum: 29296 e1d1fbeea475a3b7cb788e0dcb03ba08
Little endian MIPS architecture:
http://security.debian.org/pool/updates/main/o/osh/osh_1.7-11woody1_mipsel.deb
Size/MD5 checksum: 29218 1c647b0936720769bd3be3649849db7f
PowerPC architecture:
http://security.debian.org/pool/updates/main/o/osh/osh_1.7-11woody1_powerpc.deb
Size/MD5 checksum: 28534 7b6ef4f5ac2c7d3dd919262d04b24f7d
IBM S/390 architecture:
http://security.debian.org/pool/updates/main/o/osh/osh_1.7-11woody1_s390.deb
Size/MD5 checksum: 27944 b14299fa7552124c3e6b05001e79e646
Sun Sparc architecture:
http://security.debian.org/pool/updates/main/o/osh/osh_1.7-11woody1_sparc.deb
Size/MD5 checksum: 30626 58a7ccea2b17bbdbd124565545dd1057
These files will probably be moved into the stable distribution
on its next revision.
For apt-get: deb http://security.debian.org/
stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security
dists/stable/updates/main
Mailing list: [email protected]
Package info: `apt-cache show <pkg>’ and http://packages.debian.org/<pkg>