Säkerhetsbulletin från Debian

DSA-1318-1 ekg -- flera sårbarheter

Rapporterat den:
2007-06-22
Berörda paket:
ekg
Sårbara:
Ja
Referenser i säkerhetsdatabaser:
I Mitres CVE-förteckning: CVE-2005-2370, CVE-2005-2448, CVE-2007-1663, CVE-2007-1664, CVE-2007-1665.
Ytterligare information:

Flera sårbarheter har upptäckts i ekg, en konsolbaserad Gadu Gadu-klient. Projektet Common Vulnerabilities and Exposures identifierar följande problem:

  • CVE-2005-2370

    Man har upptäckt att minnesjusteringsfel kunde göra det möjligt för angripare utifrån att utföra överbelastningsattacker på vissa arkitekturer, till exempel Sparc. Detta påverkar enbart Debian Sarge.

  • CVE-2005-2448

    Man har upptäckt att flera endian-fel kunde göra det möjligt för angripare utifrån att utföra en överbelastningsattack. Detta påverkar enbart Debian Sarge.

  • CVE-2007-1663

    Man har upptäckte att en minnesläcka i hanteringen av bildmeddelanden kunde användas i en överbelastningsattack. Detta påverkar enbart Debian Etch.

  • CVE-2007-1664

    Man har upptäckt att en null-pekaravreferering i token-OCR-koden kunde användas i en överbelastningsattack. Detta påverkar enbart Debian Etch.

  • CVE-2007-1665

    Man har upptäckt att en minnesläcka i token-OCR-koden kunde användas i en överbelastningsattack. Detta påverkar enbart Debian Etch.

För den gamla stabila utgåvan (Sarge) har dessa problem rättats i version 1.5+20050411-7. Denna uppdatering saknar uppdaterade paket för m68k-arkitekturen. Dessa kommer tillhandahållas senare.

För den stabila utgåvan (Etch) har dessa problem rättats i version 1:1.7~rc2-1etch1.

För den instabila utgåvan (Sid) har dessa problem rättats i version 1:1.7~rc2-2.

Vi rekommenderar att ni uppgraderar era ekg-paket.

Rättat i:

Debian GNU/Linux 3.1 (sarge)

Källkod:
http://security.debian.org/pool/updates/main/e/ekg/ekg_1.5+20050411-7.dsc
http://security.debian.org/pool/updates/main/e/ekg/ekg_1.5+20050411-7.diff.gz
http://security.debian.org/pool/updates/main/e/ekg/ekg_1.5+20050411.orig.tar.gz
Alpha:
http://security.debian.org/pool/updates/main/e/ekg/ekg_1.5+20050411-7_alpha.deb
http://security.debian.org/pool/updates/main/e/ekg/libgadu-dev_1.5+20050411-7_alpha.deb
http://security.debian.org/pool/updates/main/e/ekg/libgadu3_1.5+20050411-7_alpha.deb
AMD64:
http://security.debian.org/pool/updates/main/e/ekg/ekg_1.5+20050411-7_amd64.deb
http://security.debian.org/pool/updates/main/e/ekg/libgadu-dev_1.5+20050411-7_amd64.deb
http://security.debian.org/pool/updates/main/e/ekg/libgadu3_1.5+20050411-7_amd64.deb
ARM:
http://security.debian.org/pool/updates/main/e/ekg/ekg_1.5+20050411-7_arm.deb
http://security.debian.org/pool/updates/main/e/ekg/libgadu-dev_1.5+20050411-7_arm.deb
http://security.debian.org/pool/updates/main/e/ekg/libgadu3_1.5+20050411-7_arm.deb
HPPA:
http://security.debian.org/pool/updates/main/e/ekg/ekg_1.5+20050411-7_hppa.deb
http://security.debian.org/pool/updates/main/e/ekg/libgadu-dev_1.5+20050411-7_hppa.deb
http://security.debian.org/pool/updates/main/e/ekg/libgadu3_1.5+20050411-7_hppa.deb
Intel IA-32:
http://security.debian.org/pool/updates/main/e/ekg/ekg_1.5+20050411-7_i386.deb
http://security.debian.org/pool/updates/main/e/ekg/libgadu-dev_1.5+20050411-7_i386.deb
http://security.debian.org/pool/updates/main/e/ekg/libgadu3_1.5+20050411-7_i386.deb
Intel IA-64:
http://security.debian.org/pool/updates/main/e/ekg/ekg_1.5+20050411-7_ia64.deb
http://security.debian.org/pool/updates/main/e/ekg/libgadu-dev_1.5+20050411-7_ia64.deb
http://security.debian.org/pool/updates/main/e/ekg/libgadu3_1.5+20050411-7_ia64.deb
Big endian MIPS:
http://security.debian.org/pool/updates/main/e/ekg/ekg_1.5+20050411-7_mips.deb
http://security.debian.org/pool/updates/main/e/ekg/libgadu-dev_1.5+20050411-7_mips.deb
http://security.debian.org/pool/updates/main/e/ekg/libgadu3_1.5+20050411-7_mips.deb
Little endian MIPS:
http://security.debian.org/pool/updates/main/e/ekg/ekg_1.5+20050411-7_mipsel.deb
http://security.debian.org/pool/updates/main/e/ekg/libgadu-dev_1.5+20050411-7_mipsel.deb
http://security.debian.org/pool/updates/main/e/ekg/libgadu3_1.5+20050411-7_mipsel.deb
PowerPC:
http://security.debian.org/pool/updates/main/e/ekg/ekg_1.5+20050411-7_powerpc.deb
http://security.debian.org/pool/updates/main/e/ekg/libgadu-dev_1.5+20050411-7_powerpc.deb
http://security.debian.org/pool/updates/main/e/ekg/libgadu3_1.5+20050411-7_powerpc.deb
IBM S/390:
http://security.debian.org/pool/updates/main/e/ekg/ekg_1.5+20050411-7_s390.deb
http://security.debian.org/pool/updates/main/e/ekg/libgadu-dev_1.5+20050411-7_s390.deb
http://security.debian.org/pool/updates/main/e/ekg/libgadu3_1.5+20050411-7_s390.deb
Sun Sparc:
http://security.debian.org/pool/updates/main/e/ekg/ekg_1.5+20050411-7_sparc.deb
http://security.debian.org/pool/updates/main/e/ekg/libgadu-dev_1.5+20050411-7_sparc.deb
http://security.debian.org/pool/updates/main/e/ekg/libgadu3_1.5+20050411-7_sparc.deb

Debian GNU/Linux 4.0 (etch)

Källkod:
http://security.debian.org/pool/updates/main/e/ekg/ekg_1.7~rc2-1etch1.dsc
http://security.debian.org/pool/updates/main/e/ekg/ekg_1.7~rc2-1etch1.diff.gz
http://security.debian.org/pool/updates/main/e/ekg/ekg_1.7~rc2.orig.tar.gz
Alpha:
http://security.debian.org/pool/updates/main/e/ekg/ekg_1.7~rc2-1etch1_alpha.deb
http://security.debian.org/pool/updates/main/e/ekg/libgadu-dev_1.7~rc2-1etch1_alpha.deb
http://security.debian.org/pool/updates/main/e/ekg/libgadu3_1.7~rc2-1etch1_alpha.deb
AMD64:
http://security.debian.org/pool/updates/main/e/ekg/ekg_1.7~rc2-1etch1_amd64.deb
http://security.debian.org/pool/updates/main/e/ekg/libgadu-dev_1.7~rc2-1etch1_amd64.deb
http://security.debian.org/pool/updates/main/e/ekg/libgadu3_1.7~rc2-1etch1_amd64.deb
ARM:
http://security.debian.org/pool/updates/main/e/ekg/ekg_1.7~rc2-1etch1_arm.deb
http://security.debian.org/pool/updates/main/e/ekg/libgadu-dev_1.7~rc2-1etch1_arm.deb
http://security.debian.org/pool/updates/main/e/ekg/libgadu3_1.7~rc2-1etch1_arm.deb
HPPA:
http://security.debian.org/pool/updates/main/e/ekg/ekg_1.7~rc2-1etch1_hppa.deb
http://security.debian.org/pool/updates/main/e/ekg/libgadu-dev_1.7~rc2-1etch1_hppa.deb
http://security.debian.org/pool/updates/main/e/ekg/libgadu3_1.7~rc2-1etch1_hppa.deb
Intel IA-32:
http://security.debian.org/pool/updates/main/e/ekg/ekg_1.7~rc2-1etch1_i386.deb
http://security.debian.org/pool/updates/main/e/ekg/libgadu-dev_1.7~rc2-1etch1_i386.deb
http://security.debian.org/pool/updates/main/e/ekg/libgadu3_1.7~rc2-1etch1_i386.deb
Intel IA-64:
http://security.debian.org/pool/updates/main/e/ekg/ekg_1.7~rc2-1etch1_ia64.deb
http://security.debian.org/pool/updates/main/e/ekg/libgadu-dev_1.7~rc2-1etch1_ia64.deb
http://security.debian.org/pool/updates/main/e/ekg/libgadu3_1.7~rc2-1etch1_ia64.deb
Big endian MIPS:
http://security.debian.org/pool/updates/main/e/ekg/ekg_1.7~rc2-1etch1_mips.deb
http://security.debian.org/pool/updates/main/e/ekg/libgadu-dev_1.7~rc2-1etch1_mips.deb
http://security.debian.org/pool/updates/main/e/ekg/libgadu3_1.7~rc2-1etch1_mips.deb
Little endian MIPS:
http://security.debian.org/pool/updates/main/e/ekg/ekg_1.7~rc2-1etch1_mipsel.deb
http://security.debian.org/pool/updates/main/e/ekg/libgadu-dev_1.7~rc2-1etch1_mipsel.deb
http://security.debian.org/pool/updates/main/e/ekg/libgadu3_1.7~rc2-1etch1_mipsel.deb
PowerPC:
http://security.debian.org/pool/updates/main/e/ekg/ekg_1.7~rc2-1etch1_powerpc.deb
http://security.debian.org/pool/updates/main/e/ekg/libgadu-dev_1.7~rc2-1etch1_powerpc.deb
http://security.debian.org/pool/updates/main/e/ekg/libgadu3_1.7~rc2-1etch1_powerpc.deb
IBM S/390:
http://security.debian.org/pool/updates/main/e/ekg/ekg_1.7~rc2-1etch1_s390.deb
http://security.debian.org/pool/updates/main/e/ekg/libgadu-dev_1.7~rc2-1etch1_s390.deb
http://security.debian.org/pool/updates/main/e/ekg/libgadu3_1.7~rc2-1etch1_s390.deb
Sun Sparc:
http://security.debian.org/pool/updates/main/e/ekg/ekg_1.7~rc2-1etch1_sparc.deb
http://security.debian.org/pool/updates/main/e/ekg/libgadu-dev_1.7~rc2-1etch1_sparc.deb
http://security.debian.org/pool/updates/main/e/ekg/libgadu3_1.7~rc2-1etch1_sparc.deb

MD5-kontrollsummor för dessa filer finns i originalbulletinen.