Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2004.0594 -- Debian Security Advisory DSA 549-1 New gtk+2.0 packages fix several vulnerabilities 21 September 2004 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: gtk+2.0 Publisher: Debian Operating System: Debian GNU/Linux 3.0 Linux variants Impact: Execute Arbitrary Code/Commands Access: Remote/Unauthenticated CVE Names: CAN-2004-0788 CAN-2004-0783 CAN-2004-0782 Ref: ESB-2004.0584 ESB-2004.0582 ESB-2004.0574 - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - - -------------------------------------------------------------------------- Debian Security Advisory DSA 549-1 security@debian.org http://www.debian.org/security/ Martin Schulze September 17th, 2004 http://www.debian.org/security/faq - - -------------------------------------------------------------------------- Package : gtk+2.0 Vulnerability : several Problem-Type : remote Debian-specific: no CVE ID : CAN-2004-0782 CAN-2004-0783 CAN-2004-0788 Chris Evans discovered several problems in gdk-pixbuf, the GdkPixBuf library used in Gtk. It is possible for an attacker to execute arbitrary code on the victims machine. Gdk-pixbuf for Gtk+1.2 is an external package. For Gtk+2.0 it's part of the main gtk package. The Common Vulnerabilities and Exposures Project identifies the following vulnerabilities: CAN-2004-0782 Heap-based overflow in pixbuf_create_from_xpm. CAN-2004-0783 Stack-based overflow in xpm_extract_color. CAN-2004-0788 Integer overflow in the ico loader. For the stable distribution (woody) these problems have been fixed in version 2.0.2-5woody2. For the unstable distribution (sid) these problems will be fixed soon. We recommend that you upgrade your Gtk packages. Upgrade Instructions - - -------------------- wget url will fetch the file for you dpkg -i file.deb will install the referenced file. If you are using the apt-get package manager, use the line for sources.list as given below: apt-get update will update the internal database apt-get upgrade will install corrected packages You may use an automated update by adding the resources from the footer to the proper configuration. Debian GNU/Linux 3.0 alias woody - - -------------------------------- Source archives: http://security.debian.org/pool/updates/main/g/gtk+2.0/gtk+2.0_2.0.2-5woody2.dsc Size/MD5 checksum: 863 e1fb1114b9e8a2a41696f9ce87e63695 http://security.debian.org/pool/updates/main/g/gtk+2.0/gtk+2.0_2.0.2-5woody2.diff.gz Size/MD5 checksum: 46831 2efce3a3481974044c1a6a1011954f18 http://security.debian.org/pool/updates/main/g/gtk+2.0/gtk+2.0_2.0.2.orig.tar.gz Size/MD5 checksum: 7835836 dc80381b84458d944c5300a1672c099c Architecture independent components: http://security.debian.org/pool/updates/main/g/gtk+2.0/libgtk2.0-doc_2.0.2-5woody2_all.deb Size/MD5 checksum: 1378706 d2d6f488c0a77c93ed5a8fd151741543 Alpha architecture: http://security.debian.org/pool/updates/main/g/gtk+2.0/gtk2.0-examples_2.0.2-5woody2_alpha.deb Size/MD5 checksum: 220806 d754d0cecc3f82d64be319c55dff5c8e http://security.debian.org/pool/updates/main/g/gtk+2.0/libgtk-common_2.0.2-5woody2_alpha.deb Size/MD5 checksum: 1102 d3ccf8d6e3b666f6dc71c35f20a6cb77 http://security.debian.org/pool/updates/main/g/gtk+2.0/libgtk2.0-0_2.0.2-5woody2_alpha.deb Size/MD5 checksum: 1585238 13f238596d197ad27933c3f3e27269f7 http://security.debian.org/pool/updates/main/g/gtk+2.0/libgtk2.0-common_2.0.2-5woody2_alpha.deb Size/MD5 checksum: 595896 57264f5be6eb488ea9607cd2f7058e08 http://security.debian.org/pool/updates/main/g/gtk+2.0/libgtk2.0-dbg_2.0.2-5woody2_alpha.deb Size/MD5 checksum: 5878498 0ffc094ffe8ef6fdd11b38484ea90477 http://security.debian.org/pool/updates/main/g/gtk+2.0/libgtk2.0-dev_2.0.2-5woody2_alpha.deb Size/MD5 checksum: 178322 14de2746abdb546a703aeec243e28a12 ARM architecture: http://security.debian.org/pool/updates/main/g/gtk+2.0/gtk2.0-examples_2.0.2-5woody2_arm.deb Size/MD5 checksum: 214610 c2a2b4874321a68a912afcac8efe4432 http://security.debian.org/pool/updates/main/g/gtk+2.0/libgtk-common_2.0.2-5woody2_arm.deb Size/MD5 checksum: 1106 d78aba4e1a787ac217dc055dc8e5d77a http://security.debian.org/pool/updates/main/g/gtk+2.0/libgtk2.0-0_2.0.2-5woody2_arm.deb Size/MD5 checksum: 1419902 92ed65acd376e565968d534df0e56b4f http://security.debian.org/pool/updates/main/g/gtk+2.0/libgtk2.0-common_2.0.2-5woody2_arm.deb Size/MD5 checksum: 595286 a8f465878ea70bb232fc4fc7d460462d http://security.debian.org/pool/updates/main/g/gtk+2.0/libgtk2.0-dbg_2.0.2-5woody2_arm.deb Size/MD5 checksum: 2904044 843cba67b1831b001b9186c11d7d5c72 http://security.debian.org/pool/updates/main/g/gtk+2.0/libgtk2.0-dev_2.0.2-5woody2_arm.deb Size/MD5 checksum: 177272 f02861b5aa96ea782f041db0ba00fe11 Intel IA-32 architecture: http://security.debian.org/pool/updates/main/g/gtk+2.0/gtk2.0-examples_2.0.2-5woody2_i386.deb Size/MD5 checksum: 214932 abd81a3388a82c15364189b0321c931a http://security.debian.org/pool/updates/main/g/gtk+2.0/libgtk-common_2.0.2-5woody2_i386.deb Size/MD5 checksum: 1102 6a63e94e140d45afd8d30f1a6aeaf4fa http://security.debian.org/pool/updates/main/g/gtk+2.0/libgtk2.0-0_2.0.2-5woody2_i386.deb Size/MD5 checksum: 1289428 a1f0196674f1556a9700a29912ed4b77 http://security.debian.org/pool/updates/main/g/gtk+2.0/libgtk2.0-common_2.0.2-5woody2_i386.deb Size/MD5 checksum: 595384 485b9ec09c0ddfa5564b25c2fcec58f7 http://security.debian.org/pool/updates/main/g/gtk+2.0/libgtk2.0-dbg_2.0.2-5woody2_i386.deb Size/MD5 checksum: 2722306 a59b27568500db9dcd8a2ffbf2866f2b http://security.debian.org/pool/updates/main/g/gtk+2.0/libgtk2.0-dev_2.0.2-5woody2_i386.deb Size/MD5 checksum: 177140 245e88cb2addad57e7273b76fb145930 Intel IA-64 architecture: http://security.debian.org/pool/updates/main/g/gtk+2.0/gtk2.0-examples_2.0.2-5woody2_ia64.deb Size/MD5 checksum: 230652 df3f392fc1d8f749134f03413e6b07b3 http://security.debian.org/pool/updates/main/g/gtk+2.0/libgtk-common_2.0.2-5woody2_ia64.deb Size/MD5 checksum: 1098 9f692a19e0d16699852bf7c16de2a05b http://security.debian.org/pool/updates/main/g/gtk+2.0/libgtk2.0-0_2.0.2-5woody2_ia64.deb Size/MD5 checksum: 2076782 8b4e1e4a232881916a2da1f39f3bff18 http://security.debian.org/pool/updates/main/g/gtk+2.0/libgtk2.0-common_2.0.2-5woody2_ia64.deb Size/MD5 checksum: 596736 fbaedfd29974d78a92de77666be3ca6a http://security.debian.org/pool/updates/main/g/gtk+2.0/libgtk2.0-dbg_2.0.2-5woody2_ia64.deb Size/MD5 checksum: 9450414 6c1356d0a6caac17bcfee6794c7eb0e3 http://security.debian.org/pool/updates/main/g/gtk+2.0/libgtk2.0-dev_2.0.2-5woody2_ia64.deb Size/MD5 checksum: 178702 a248446a3b02a0a3bc7695bc364423d0 HP Precision architecture: http://security.debian.org/pool/updates/main/g/gtk+2.0/gtk2.0-examples_2.0.2-5woody2_hppa.deb Size/MD5 checksum: 220414 5541da711355e2a8f43e9fc113ef0768 http://security.debian.org/pool/updates/main/g/gtk+2.0/libgtk-common_2.0.2-5woody2_hppa.deb Size/MD5 checksum: 1104 527a4a2a3c489297eeb7ba3cbfd438a4 http://security.debian.org/pool/updates/main/g/gtk+2.0/libgtk2.0-0_2.0.2-5woody2_hppa.deb Size/MD5 checksum: 1718082 f4f7d125622fb444f1e4f0cedc8a4e2d http://security.debian.org/pool/updates/main/g/gtk+2.0/libgtk2.0-common_2.0.2-5woody2_hppa.deb Size/MD5 checksum: 595658 50ed99e08d60d5de0abbdb1d26775c26 http://security.debian.org/pool/updates/main/g/gtk+2.0/libgtk2.0-dbg_2.0.2-5woody2_hppa.deb Size/MD5 checksum: 3317262 ba0fa17d9fa8b56a0f55b59e6768bfa7 http://security.debian.org/pool/updates/main/g/gtk+2.0/libgtk2.0-dev_2.0.2-5woody2_hppa.deb Size/MD5 checksum: 177784 fa9a3da8d0bcc4786c2c1ddea49dc75d Motorola 680x0 architecture: http://security.debian.org/pool/updates/main/g/gtk+2.0/gtk2.0-examples_2.0.2-5woody2_m68k.deb Size/MD5 checksum: 214628 952fad1b5e2cf93ceda4d5d63e19f765 http://security.debian.org/pool/updates/main/g/gtk+2.0/libgtk-common_2.0.2-5woody2_m68k.deb Size/MD5 checksum: 1108 8ced141cb0b5be513e6c6561d12c5a63 http://security.debian.org/pool/updates/main/g/gtk+2.0/libgtk2.0-0_2.0.2-5woody2_m68k.deb Size/MD5 checksum: 1331140 e2aba56732d36042f31066ddf8c028d8 http://security.debian.org/pool/updates/main/g/gtk+2.0/libgtk2.0-common_2.0.2-5woody2_m68k.deb Size/MD5 checksum: 595398 9b672797a3c23ee8a2f8a3efc71d3c71 http://security.debian.org/pool/updates/main/g/gtk+2.0/libgtk2.0-dbg_2.0.2-5woody2_m68k.deb Size/MD5 checksum: 2833708 f651eb5d6120d31e7f3928e74aba8980 http://security.debian.org/pool/updates/main/g/gtk+2.0/libgtk2.0-dev_2.0.2-5woody2_m68k.deb Size/MD5 checksum: 177030 9845cbf7bf9e07645dcb77274b5c33ab Big endian MIPS architecture: http://security.debian.org/pool/updates/main/g/gtk+2.0/gtk2.0-examples_2.0.2-5woody2_mips.deb Size/MD5 checksum: 215928 d7588d79c18352e3338f2f4e63d5965a http://security.debian.org/pool/updates/main/g/gtk+2.0/libgtk-common_2.0.2-5woody2_mips.deb Size/MD5 checksum: 1106 7cf40a77a0343f3e5a31ded6dc331490 http://security.debian.org/pool/updates/main/g/gtk+2.0/libgtk2.0-0_2.0.2-5woody2_mips.deb Size/MD5 checksum: 1384582 1dfc5eb807003319d401f80c94c6bf90 http://security.debian.org/pool/updates/main/g/gtk+2.0/libgtk2.0-common_2.0.2-5woody2_mips.deb Size/MD5 checksum: 595756 3ef292a9f9f3dec4a2c141673881ed96 http://security.debian.org/pool/updates/main/g/gtk+2.0/libgtk2.0-dbg_2.0.2-5woody2_mips.deb Size/MD5 checksum: 4934272 a54b24f1384ed35991e791dc307a69ba http://security.debian.org/pool/updates/main/g/gtk+2.0/libgtk2.0-dev_2.0.2-5woody2_mips.deb Size/MD5 checksum: 177508 35d84c694be2215cc97aaf7142446949 Little endian MIPS architecture: http://security.debian.org/pool/updates/main/g/gtk+2.0/gtk2.0-examples_2.0.2-5woody2_mipsel.deb Size/MD5 checksum: 215604 5cc6dd64570c935fd94dee4f087233e7 http://security.debian.org/pool/updates/main/g/gtk+2.0/libgtk-common_2.0.2-5woody2_mipsel.deb Size/MD5 checksum: 1104 fe87437ef7062d2f594a8939f4fc32d5 http://security.debian.org/pool/updates/main/g/gtk+2.0/libgtk2.0-0_2.0.2-5woody2_mipsel.deb Size/MD5 checksum: 1375248 f06ee4d4dfa8c6f83da5463e1d6c68e0 http://security.debian.org/pool/updates/main/g/gtk+2.0/libgtk2.0-common_2.0.2-5woody2_mipsel.deb Size/MD5 checksum: 595704 0843d132d11c21f4dacc713cce9bfe86 http://security.debian.org/pool/updates/main/g/gtk+2.0/libgtk2.0-dbg_2.0.2-5woody2_mipsel.deb Size/MD5 checksum: 4789102 a8434a64c728d1681e0cb67579f57115 http://security.debian.org/pool/updates/main/g/gtk+2.0/libgtk2.0-dev_2.0.2-5woody2_mipsel.deb Size/MD5 checksum: 177524 2c4c179ee681e7bc9660b5779c1cd789 PowerPC architecture: http://security.debian.org/pool/updates/main/g/gtk+2.0/gtk2.0-examples_2.0.2-5woody2_powerpc.deb Size/MD5 checksum: 214682 98b2500d59c65aba8ee0b11182075ee7 http://security.debian.org/pool/updates/main/g/gtk+2.0/libgtk-common_2.0.2-5woody2_powerpc.deb Size/MD5 checksum: 1106 dc96de399a2ff8b240b3c617aed8eec9 http://security.debian.org/pool/updates/main/g/gtk+2.0/libgtk2.0-0_2.0.2-5woody2_powerpc.deb Size/MD5 checksum: 1504824 62e8dd6e29202ec7b93125608e0843de http://security.debian.org/pool/updates/main/g/gtk+2.0/libgtk2.0-common_2.0.2-5woody2_powerpc.deb Size/MD5 checksum: 595492 2149f524cfd0d8c000d9b898558adf2f http://security.debian.org/pool/updates/main/g/gtk+2.0/libgtk2.0-dbg_2.0.2-5woody2_powerpc.deb Size/MD5 checksum: 2980810 1fb39be5851af4c2b7bed18211f07f7f http://security.debian.org/pool/updates/main/g/gtk+2.0/libgtk2.0-dev_2.0.2-5woody2_powerpc.deb Size/MD5 checksum: 177308 50c27f03e3cbb55460682bb4cc78f288 IBM S/390 architecture: http://security.debian.org/pool/updates/main/g/gtk+2.0/gtk2.0-examples_2.0.2-5woody2_s390.deb Size/MD5 checksum: 217456 f09ceaad55029059c3c0881d810f0588 http://security.debian.org/pool/updates/main/g/gtk+2.0/libgtk-common_2.0.2-5woody2_s390.deb Size/MD5 checksum: 1102 13c51d35dd739aa20cde20ac8407c264 http://security.debian.org/pool/updates/main/g/gtk+2.0/libgtk2.0-0_2.0.2-5woody2_s390.deb Size/MD5 checksum: 1446606 fed3c63829a9f11ca862cec3561f3460 http://security.debian.org/pool/updates/main/g/gtk+2.0/libgtk2.0-common_2.0.2-5woody2_s390.deb Size/MD5 checksum: 595662 ce432586ed7c73c0d5e8bda255b4d4af http://security.debian.org/pool/updates/main/g/gtk+2.0/libgtk2.0-dbg_2.0.2-5woody2_s390.deb Size/MD5 checksum: 3004760 251ada8d3dd7f4390d48c6fd1b00f85b http://security.debian.org/pool/updates/main/g/gtk+2.0/libgtk2.0-dev_2.0.2-5woody2_s390.deb Size/MD5 checksum: 177364 4085419a638670f3e6a227b073bcfe9d Sun Sparc architecture: http://security.debian.org/pool/updates/main/g/gtk+2.0/gtk2.0-examples_2.0.2-5woody2_sparc.deb Size/MD5 checksum: 215616 e4b0fca8e9a4d954713615b223036a25 http://security.debian.org/pool/updates/main/g/gtk+2.0/libgtk-common_2.0.2-5woody2_sparc.deb Size/MD5 checksum: 1102 75aefe007d272f0d459848aa984d76ed http://security.debian.org/pool/updates/main/g/gtk+2.0/libgtk2.0-0_2.0.2-5woody2_sparc.deb Size/MD5 checksum: 1434138 47f684ef7bb814f884efb45a4dc7ef51 http://security.debian.org/pool/updates/main/g/gtk+2.0/libgtk2.0-common_2.0.2-5woody2_sparc.deb Size/MD5 checksum: 595332 6684502ffc4b161929b3c0996f5e436f http://security.debian.org/pool/updates/main/g/gtk+2.0/libgtk2.0-dbg_2.0.2-5woody2_sparc.deb Size/MD5 checksum: 2872322 a69e4200c018c48c1bfd4c4d140891dc http://security.debian.org/pool/updates/main/g/gtk+2.0/libgtk2.0-dev_2.0.2-5woody2_sparc.deb Size/MD5 checksum: 177178 3e2de7e036b45561d918905d08720ae8 These files will probably be moved into the stable distribution on its next update. - - --------------------------------------------------------------------------------- For apt-get: deb http://security.debian.org/ stable/updates main For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main Mailing list: debian-security-announce@lists.debian.org Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg> - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.5 (GNU/Linux) iD8DBQFBSq19W5ql+IAeqTIRArMSAKCT5ZJPFhftlGpFla1SzQEwt3vu5ACeN6qs XdA0qjsHg/CZGyy4AZGXY0U= =UANQ - -----END PGP SIGNATURE----- - -- To UNSUBSCRIBE, email to debian-security-announce-REQUEST@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 If you believe that your computer system has been compromised or attacked in any way, we encourage you to let us know by completing the secure National IT Incident Reporting Form at: http://www.auscert.org.au/render.html?it=3192 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQCVAwUBQU/Dzih9+71yA2DNAQI6kgP/RXlSYDBuIFK7iKYA4sUcYYENA9Kj66Wx wvW1H8Tn0iccuY3XE0bwS7SV2rkgIH/41dioiiqVLcl7eDkM7RzE0xtNVb6vqqMW iq7Qu2GGlQVCj13yRq+IAnf9RokK+P4d7Kw5CfDps+QHhbgoT+9cvrFCWnqCPy5R 2piJlFocR1Y= =8rmo -----END PGP SIGNATURE-----