Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2003.0421 -- Debian Security Advisory DSA-320-1 New mikmod packages fix buffer overflow 16 June 2003 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: mikmod Publisher: Debian Operating System: Debian GNU/Linux 3.0 Debian GNU/Linux 2.2 Linux Impact: Reduced Security Access Required: Existing Account - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - - -------------------------------------------------------------------------- Debian Security Advisory DSA 320-1 security@debian.org http://www.debian.org/security/ Matt Zimmerman June 13th, 2003 http://www.debian.org/security/faq - - -------------------------------------------------------------------------- Package : mikmod Vulnerability : buffer overflow Problem-Type : local Debian-specific: no CVE Id : CAN-2003-0427 Ingo Saitz discovered a bug in mikmod whereby a long filename inside an archive file can overflow a buffer when the archive is being read by mikmod. For the stable distribution (woody) this problem has been fixed in version 3.1.6-4woody3. For old stable distribution (potato) this problem has been fixed in version 3.1.6-2potato3. For the unstable distribution (sid) this problem is fixed in version 3.1.6-6. We recommend that you update your mikmod package. Upgrade Instructions - - -------------------- wget url will fetch the file for you dpkg -i file.deb will install the referenced file. If you are using the apt-get package manager, use the line for sources.list as given below: apt-get update will update the internal database apt-get upgrade will install corrected packages You may use an automated update by adding the resources from the footer to the proper configuration. Debian GNU/Linux 2.2 alias potato - - --------------------------------- Source archives: http://security.debian.org/pool/updates/main/m/mikmod/mikmod_3.1.6-2potato3.dsc Size/MD5 checksum: 595 d0a811016b5025b327eea822373f12d5 http://security.debian.org/pool/updates/main/m/mikmod/mikmod_3.1.6-2potato3.diff.gz Size/MD5 checksum: 6207 2ce7c29ac4c12632de56a1db093982f7 http://security.debian.org/pool/updates/main/m/mikmod/mikmod_3.1.6.orig.tar.gz Size/MD5 checksum: 134827 71d8142ae3ae27034535913e906b1384 Alpha architecture: http://security.debian.org/pool/updates/main/m/mikmod/mikmod_3.1.6-2potato3_alpha.deb Size/MD5 checksum: 62968 0c0d4ff734a7c02e4d8c862bb3745713 ARM architecture: http://security.debian.org/pool/updates/main/m/mikmod/mikmod_3.1.6-2potato3_arm.deb Size/MD5 checksum: 52588 7d5da70323e8549fc7cf5528173f3d1d Intel IA-32 architecture: http://security.debian.org/pool/updates/main/m/mikmod/mikmod_3.1.6-2potato3_i386.deb Size/MD5 checksum: 50666 f00f6100852c6a25be4909e861368877 Motorola 680x0 architecture: http://security.debian.org/pool/updates/main/m/mikmod/mikmod_3.1.6-2potato3_m68k.deb Size/MD5 checksum: 48942 390d71cc5d5f98e84e077961740b9608 PowerPC architecture: http://security.debian.org/pool/updates/main/m/mikmod/mikmod_3.1.6-2potato3_powerpc.deb Size/MD5 checksum: 53578 ef6419433633f01244eafeb7b61d0e6c Sun Sparc architecture: http://security.debian.org/pool/updates/main/m/mikmod/mikmod_3.1.6-2potato3_sparc.deb Size/MD5 checksum: 54836 ca9367c16507f4ed6d247cc7001d777a Debian GNU/Linux 3.0 alias woody - - -------------------------------- Source archives: http://security.debian.org/pool/updates/main/m/mikmod/mikmod_3.1.6-4woody3.dsc Size/MD5 checksum: 608 b52405fb77329efddae915e145a9751d http://security.debian.org/pool/updates/main/m/mikmod/mikmod_3.1.6-4woody3.diff.gz Size/MD5 checksum: 9726 35080e8530e9924be4d86aafbd31b84d http://security.debian.org/pool/updates/main/m/mikmod/mikmod_3.1.6.orig.tar.gz Size/MD5 checksum: 134827 71d8142ae3ae27034535913e906b1384 Alpha architecture: http://security.debian.org/pool/updates/main/m/mikmod/mikmod_3.1.6-4woody3_alpha.deb Size/MD5 checksum: 62712 fe5456aa0ca7a1819fd1bb87b82bde1a ARM architecture: http://security.debian.org/pool/updates/main/m/mikmod/mikmod_3.1.6-4woody3_arm.deb Size/MD5 checksum: 52602 d75974481a2b2e23c47a7f700bf878e5 Intel IA-32 architecture: http://security.debian.org/pool/updates/main/m/mikmod/mikmod_3.1.6-4woody3_i386.deb Size/MD5 checksum: 50578 fde5b864a91bdddf1b07720af26cf5d5 Intel IA-64 architecture: http://security.debian.org/pool/updates/main/m/mikmod/mikmod_3.1.6-4woody3_ia64.deb Size/MD5 checksum: 76108 ad1cbef734d43f5e0fa5bad3c7f1cd72 HP Precision architecture: http://security.debian.org/pool/updates/main/m/mikmod/mikmod_3.1.6-4woody3_hppa.deb Size/MD5 checksum: 58482 9edb50e45214bc0b3225f5070df2b59f Motorola 680x0 architecture: http://security.debian.org/pool/updates/main/m/mikmod/mikmod_3.1.6-4woody3_m68k.deb Size/MD5 checksum: 48554 a52f8913418501bf6a4b103e14636436 Big endian MIPS architecture: http://security.debian.org/pool/updates/main/m/mikmod/mikmod_3.1.6-4woody3_mips.deb Size/MD5 checksum: 57352 4edbef3712ec7220cdbe410c61aa8406 Little endian MIPS architecture: http://security.debian.org/pool/updates/main/m/mikmod/mikmod_3.1.6-4woody3_mipsel.deb Size/MD5 checksum: 57538 f0846374f89bc626f6ed29fd82bbd4af PowerPC architecture: http://security.debian.org/pool/updates/main/m/mikmod/mikmod_3.1.6-4woody3_powerpc.deb Size/MD5 checksum: 53758 9a8e2a41cf260e5eecfd0472f2f574e6 IBM S/390 architecture: http://security.debian.org/pool/updates/main/m/mikmod/mikmod_3.1.6-4woody3_s390.deb Size/MD5 checksum: 53038 bddc8a9dcdea2b4386b5d5a4b3d281e1 Sun Sparc architecture: http://security.debian.org/pool/updates/main/m/mikmod/mikmod_3.1.6-4woody3_sparc.deb Size/MD5 checksum: 52786 9da2c9dc87e8c9d742483e5929c2e90f These files will probably be moved into the stable distribution on its next revision. - - --------------------------------------------------------------------------------- For apt-get: deb http://security.debian.org/ stable/updates main For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main Mailing list: debian-security-announce@lists.debian.org Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg> - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.2 (GNU/Linux) iD8DBQE+6mHPArxCt0PiXR4RAuPWAKC9D9UPKS01cuSrUpm/CknNhAgKCgCgy6kZ kBR4XBA9Qv2FNuCeyX5tycA= =679d - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to use any or all of this information is the responsibility of each user or organisation, and should be done so in accordance with site policies and procedures. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 If you believe that your system has been compromised, contact AusCERT or your representative in FIRST (Forum of Incident Response and Security Teams). Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQCVAwUBPu0/Kyh9+71yA2DNAQEjUwP8DdnWliWxeyUitQkAJxCYPDdHMvAEp1JI fJaRyA757g2JLtfDcHME7kEWdk76om2d9753izMVeHt0SrtsY98Hu+EdphQlNMu2 CI/Ri6J6NJ8eUBCJoP8Lz/igrsmIAAVtvgc/VxWOdT+7CknTve9QtcCTMEiR/9P0 pHTnt9YjMOk= =ijpw -----END PGP SIGNATURE-----