Debian Security Advisory

DSA-773-1 amd64 -- several vulnerabilities

Date Reported:
11 Aug 2005
Affected Packages:
Security database references:
No other external database security references currently available.
More information:

This advisory adds security support for the stable amd64 distribution. It covers all security updates since the release of sarge, which were missing updated packages for the not yet official amd64 port. Future security advisories will include updates for this port as well.

Fixed in:

Debian GNU/Linux 3.1 (sarge)

DSA 762: several vulnerabilities
DSA 754: insecure temporary file
DSA 737: remote denial of service
DSA 733: insecure temporary files
DSA 742: buffer overflow
DSA 750: out-of-bound memory access
DSA 760, DSA 767: several vulnerabilities
DSA 749: format string error
DSA 744: programming error
DSA 734, DSA 7699: denial of service, memory alignment bug
DSA 753: format string
DSA 770: insecure tmpfile creation
DSA 761: insecure temporary files
DSA 758, DSA 765: buffer overflows
DSA 743: buffer overflows, integer overflows
DSA 757: buffer overflow, double-free memory
DSA 771: several vulnerabilities
DSA 725: missing privilege release
DSA 728: missing privilege release
DSA 738: remote denial of service
DSA 748: bad default value
DSA 736: remote denial of service
DSA 735: pathname validation race
DSA-740, DSA 763: remote denial of service

MD5 checksums of the listed files are available in the original advisory.