Debians sikkerhedsbulletin

DSA-1368-1 librpcsecgss -- bufferoverløb

Rapporteret den:
4. sep 2007
Berørte pakker:
librpcsecgss
Sårbar:
Ja
Referencer i sikkerhedsdatabaser:
I Mitres CVE-ordbog: CVE-2007-3999.
Yderligere oplysninger:

Man har opdaget at et bufferoverløb i biblioteket til sikker RPC-kommunikation gennem protokollen rpcsec_gss protocol tillod udførelse af vilkårlig kode.

Den gamle stabile distribution (sarge) indeholder ikke librpcsecgss.

I den stabile distribution (etch) er dette problem rettet i version 0.14-2etch1.

I den ustabile distribution (sid) vil dette problem snart blive rettet.

Vi anbefaler at du opgraderer dine librpcsecgss-pakker.

Rettet i:

Debian GNU/Linux 4.0 (etch)

Kildekode:
http://security.debian.org/pool/updates/main/libr/librpcsecgss/librpcsecgss_0.14-2etch1.dsc
http://security.debian.org/pool/updates/main/libr/librpcsecgss/librpcsecgss_0.14-2etch1.diff.gz
http://security.debian.org/pool/updates/main/libr/librpcsecgss/librpcsecgss_0.14.orig.tar.gz
Alpha:
http://security.debian.org/pool/updates/main/libr/librpcsecgss/librpcsecgss-dev_0.14-2etch1_alpha.deb
http://security.debian.org/pool/updates/main/libr/librpcsecgss/librpcsecgss3_0.14-2etch1_alpha.deb
AMD64:
http://security.debian.org/pool/updates/main/libr/librpcsecgss/librpcsecgss-dev_0.14-2etch1_amd64.deb
http://security.debian.org/pool/updates/main/libr/librpcsecgss/librpcsecgss3_0.14-2etch1_amd64.deb
ARM:
http://security.debian.org/pool/updates/main/libr/librpcsecgss/librpcsecgss-dev_0.14-2etch1_arm.deb
http://security.debian.org/pool/updates/main/libr/librpcsecgss/librpcsecgss3_0.14-2etch1_arm.deb
HPPA:
http://security.debian.org/pool/updates/main/libr/librpcsecgss/librpcsecgss-dev_0.14-2etch1_hppa.deb
http://security.debian.org/pool/updates/main/libr/librpcsecgss/librpcsecgss3_0.14-2etch1_hppa.deb
Intel IA-32:
http://security.debian.org/pool/updates/main/libr/librpcsecgss/librpcsecgss-dev_0.14-2etch1_i386.deb
http://security.debian.org/pool/updates/main/libr/librpcsecgss/librpcsecgss3_0.14-2etch1_i386.deb
Intel IA-64:
http://security.debian.org/pool/updates/main/libr/librpcsecgss/librpcsecgss-dev_0.14-2etch1_ia64.deb
http://security.debian.org/pool/updates/main/libr/librpcsecgss/librpcsecgss3_0.14-2etch1_ia64.deb
Big endian MIPS:
http://security.debian.org/pool/updates/main/libr/librpcsecgss/librpcsecgss-dev_0.14-2etch1_mips.deb
http://security.debian.org/pool/updates/main/libr/librpcsecgss/librpcsecgss3_0.14-2etch1_mips.deb
Little endian MIPS:
http://security.debian.org/pool/updates/main/libr/librpcsecgss/librpcsecgss-dev_0.14-2etch1_mipsel.deb
http://security.debian.org/pool/updates/main/libr/librpcsecgss/librpcsecgss3_0.14-2etch1_mipsel.deb
PowerPC:
http://security.debian.org/pool/updates/main/libr/librpcsecgss/librpcsecgss-dev_0.14-2etch1_powerpc.deb
http://security.debian.org/pool/updates/main/libr/librpcsecgss/librpcsecgss3_0.14-2etch1_powerpc.deb
IBM S/390:
http://security.debian.org/pool/updates/main/libr/librpcsecgss/librpcsecgss-dev_0.14-2etch1_s390.deb
http://security.debian.org/pool/updates/main/libr/librpcsecgss/librpcsecgss3_0.14-2etch1_s390.deb
Sun Sparc:
http://security.debian.org/pool/updates/main/libr/librpcsecgss/librpcsecgss-dev_0.14-2etch1_sparc.deb
http://security.debian.org/pool/updates/main/libr/librpcsecgss/librpcsecgss3_0.14-2etch1_sparc.deb

MD5-kontrolsummer for de listede filer findes i den originale sikkerhedsbulletin.