Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2005.0531 -- Debian Security Advisory DSA 753-1 New gedit packages fix denial of service 13 July 2005 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: gedit Publisher: Debian Operating System: Debian GNU/Linux 3.1 Linux variants Impact: Denial of Service Access: Remote/Unauthenticated CVE Names: CAN-2005-1686 Original Bulletin: http://www.debian.org/security/2005/dsa-753 - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - - -------------------------------------------------------------------------- Debian Security Advisory DSA 753-1 security@debian.org http://www.debian.org/security/ Martin Schulze July 12th, 2005 http://www.debian.org/security/faq - - -------------------------------------------------------------------------- Package : gedit Vulnerability : format string Problem-Type : remote Debian-specific: no CVE ID : CAN-2005-1686 A format string vulnerability has been discovered in gedit, a light-weight text editor for GNOME, that may allow attackers to cause a denial of service (application crash) via a binary file with format string specifiers in the filename. Since gedit supports opening files via "http://" URLs (through GNOME vfs) and other schemes, this might be a remotely exploitable vulnerability. The old stable distribution (woody) is not vulnerable to this problem. For the stable distribution (sarge) this problem has been fixed in version 2.8.3-4sarge1. For the unstable distribution (sid) this problem has been fixed in version 2.10.3-1. We recommend that you upgrade your gedit package. Upgrade Instructions - - -------------------- wget url will fetch the file for you dpkg -i file.deb will install the referenced file. If you are using the apt-get package manager, use the line for sources.list as given below: apt-get update will update the internal database apt-get upgrade will install corrected packages You may use an automated update by adding the resources from the footer to the proper configuration. Debian GNU/Linux 3.1 alias sarge - - -------------------------------- Source archives: http://security.debian.org/pool/updates/main/g/gedit/gedit_2.8.3-4sarge1.dsc Size/MD5 checksum: 1848 99c4beadcf902ee5857c7a3150f4d0ad http://security.debian.org/pool/updates/main/g/gedit/gedit_2.8.3-4sarge1.diff.gz Size/MD5 checksum: 54443 96de2c7d0d757d867f46d36490e0ee92 http://security.debian.org/pool/updates/main/g/gedit/gedit_2.8.3.orig.tar.gz Size/MD5 checksum: 4051445 cbbd5999141d6de932a0afdd55f1aa35 Architecture independent components: http://security.debian.org/pool/updates/main/g/gedit/gedit-common_2.8.3-4sarge1_all.deb Size/MD5 checksum: 1826070 d8519b91f1a8aeba351b1eca19c17712 http://security.debian.org/pool/updates/main/g/gedit/gedit-dev_2.8.3-4sarge1_all.deb Size/MD5 checksum: 44346 01d42b323e7ffdd2a6aba454996a5a48 Alpha architecture: http://security.debian.org/pool/updates/main/g/gedit/gedit_2.8.3-4sarge1_alpha.deb Size/MD5 checksum: 523608 1f183dc0960c8e9405953fb0946a1f8b ARM architecture: http://security.debian.org/pool/updates/main/g/gedit/gedit_2.8.3-4sarge1_arm.deb Size/MD5 checksum: 457332 476fc39b828ffcd2224f4ce65e71afcc Intel IA-32 architecture: http://security.debian.org/pool/updates/main/g/gedit/gedit_2.8.3-4sarge1_i386.deb Size/MD5 checksum: 470122 7162c0ac1f1a7ccd2a315d5b4f01f5d2 Intel IA-64 architecture: http://security.debian.org/pool/updates/main/g/gedit/gedit_2.8.3-4sarge1_ia64.deb Size/MD5 checksum: 578896 85c408b6b41585ddb5d366a3d8ea8aea HP Precision architecture: http://security.debian.org/pool/updates/main/g/gedit/gedit_2.8.3-4sarge1_hppa.deb Size/MD5 checksum: 505246 2436f36b3b10b36e3af1688e420de02f Motorola 680x0 architecture: http://security.debian.org/pool/updates/main/g/gedit/gedit_2.8.3-4sarge1_m68k.deb Size/MD5 checksum: 459142 d475046c385f0ebd06912d89671f89ef Big endian MIPS architecture: http://security.debian.org/pool/updates/main/g/gedit/gedit_2.8.3-4sarge1_mips.deb Size/MD5 checksum: 456504 4e3dbf6cf317c281cd5ddfd379bfa6c1 Little endian MIPS architecture: http://security.debian.org/pool/updates/main/g/gedit/gedit_2.8.3-4sarge1_mipsel.deb Size/MD5 checksum: 455104 c466bd51b370e0bfe4a0133e9f31e87c PowerPC architecture: http://security.debian.org/pool/updates/main/g/gedit/gedit_2.8.3-4sarge1_powerpc.deb Size/MD5 checksum: 473552 7f15b8f11abb2cb017bdc8a9069f1940 IBM S/390 architecture: http://security.debian.org/pool/updates/main/g/gedit/gedit_2.8.3-4sarge1_s390.deb Size/MD5 checksum: 492994 d86d79670ebad24391213d3449db0dee Sun Sparc architecture: http://security.debian.org/pool/updates/main/g/gedit/gedit_2.8.3-4sarge1_sparc.deb Size/MD5 checksum: 462362 f24856c85dd4f7782a7377423392db70 These files will probably be moved into the stable distribution on its next update. - - --------------------------------------------------------------------------------- For apt-get: deb http://security.debian.org/ stable/updates main For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main Mailing list: debian-security-announce@lists.debian.org Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg> - -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.1 (GNU/Linux) iD8DBQFC05RBW5ql+IAeqTIRAlWRAJ9uZ9xRFlN27LTe09glLjeJ+TAP7gCfUCB1 UFrawfGF7chblAgr9K+0bsQ= =IJZV - -----END PGP SIGNATURE----- - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 If you believe that your computer system has been compromised or attacked in any way, we encourage you to let us know by completing the secure National IT Incident Reporting Form at: http://www.auscert.org.au/render.html?it=3192 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQCVAwUBQtRyXyh9+71yA2DNAQIHrgP/YkE25bab+mKtlxuQ8/Hrj/BMWXcH+k9j MzSOIIEQ+QAq7xHXwGorkjehU+hN5/VQ0yXKwrE/tigDk9RHSWphmWBO44+HMKQ5 U17NCFdYlWh7I4uAKsVyMcOImm7lspImD2Lri2Ha6f0CDp1nrhRhRlA1Ecv4aE4D mKOpy3XTCpQ= =ivvs -----END PGP SIGNATURE-----