-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - -------------------------------------------------------------------------- Debian Security Advisory DSA 976-1 security@debian.org http://www.debian.org/security/ Martin Schulze February 15th, 2006 http://www.debian.org/security/faq - -------------------------------------------------------------------------- Package : libast, libast1 Vulnerability : buffer overflow Problem type : local Debian-specific: no CVE ID : CVE-2006-0224 Johnny Mast discovered a buffer overflow in libast, the library of assorted spiffy things, that can lead to the execution of arbitary code. This library is used by eterm which is installed setgid uid which leads to a vulnerability to alter the utmp file. For the old stable distribution (woody) this problem has been fixed in version 0.4-3woody2. For the stable distribution (sarge) this problem has been fixed in version 0.6-0pre2003010606sarge1. For the unstable distribution (sid) this problem will be fixed soon. We recommend that you upgrade your libast packages. Upgrade Instructions - -------------------- wget url will fetch the file for you dpkg -i file.deb will install the referenced file. If you are using the apt-get package manager, use the line for sources.list as given below: apt-get update will update the internal database apt-get upgrade will install corrected packages You may use an automated update by adding the resources from the footer to the proper configuration. Debian GNU/Linux 3.0 alias woody - -------------------------------- Source archives: http://security.debian.org/pool/updates/main/liba/libast1/libast1_0.4-3woody2.dsc Size/MD5 checksum: 611 7ae117d391242963294499b684e783b6 http://security.debian.org/pool/updates/main/liba/libast1/libast1_0.4-3woody2.diff.gz Size/MD5 checksum: 127092 fd7f99bde6a540fe50c27761b63e27cf http://security.debian.org/pool/updates/main/liba/libast1/libast1_0.4.orig.tar.gz Size/MD5 checksum: 150283 9424286314c1d816699b28964b91d015 Alpha architecture: http://security.debian.org/pool/updates/main/liba/libast1/libast1_0.4-3woody2_alpha.deb Size/MD5 checksum: 30314 549273ceedb6d3836361ec4308df13b7 http://security.debian.org/pool/updates/main/liba/libast1/libast1-dev_0.4-3woody2_alpha.deb Size/MD5 checksum: 46418 324e44548cf1c1ae9befb810f3ebc3cc ARM architecture: http://security.debian.org/pool/updates/main/liba/libast1/libast1_0.4-3woody2_arm.deb Size/MD5 checksum: 28496 702865048ba5822eef10de3cd9007819 http://security.debian.org/pool/updates/main/liba/libast1/libast1-dev_0.4-3woody2_arm.deb Size/MD5 checksum: 37076 e454fa52adb41c91c0e9b806caf1418c Intel IA-32 architecture: http://security.debian.org/pool/updates/main/liba/libast1/libast1_0.4-3woody2_i386.deb Size/MD5 checksum: 24804 cb4f324b197dad2f1069af530e1f7051 http://security.debian.org/pool/updates/main/liba/libast1/libast1-dev_0.4-3woody2_i386.deb Size/MD5 checksum: 33096 2eae854498d4ee6a27badcf8603cab7e Intel IA-64 architecture: http://security.debian.org/pool/updates/main/liba/libast1/libast1_0.4-3woody2_ia64.deb Size/MD5 checksum: 37426 fab097ad84832a872a0af9f6b61a4db7 http://security.debian.org/pool/updates/main/liba/libast1/libast1-dev_0.4-3woody2_ia64.deb Size/MD5 checksum: 47926 530f9e8878f21ee1f2dbcb0dbd16db7d HP Precision architecture: http://security.debian.org/pool/updates/main/liba/libast1/libast1_0.4-3woody2_hppa.deb Size/MD5 checksum: 30870 9c9be1baeb94f828c281db145cac7e45 http://security.debian.org/pool/updates/main/liba/libast1/libast1-dev_0.4-3woody2_hppa.deb Size/MD5 checksum: 45820 e782f8f5846a48d7eb8a2791c61255e8 Motorola 680x0 architecture: http://security.debian.org/pool/updates/main/liba/libast1/libast1_0.4-3woody2_m68k.deb Size/MD5 checksum: 25178 4293a0569fb9f3266e8644e332c1f2bf http://security.debian.org/pool/updates/main/liba/libast1/libast1-dev_0.4-3woody2_m68k.deb Size/MD5 checksum: 32990 b78f08fede449151bde20f5b4ee82ea2 Big endian MIPS architecture: http://security.debian.org/pool/updates/main/liba/libast1/libast1_0.4-3woody2_mips.deb Size/MD5 checksum: 24826 ccdf8838e4a6c7c7ecc29916d76af616 http://security.debian.org/pool/updates/main/liba/libast1/libast1-dev_0.4-3woody2_mips.deb Size/MD5 checksum: 40754 9ea070dc4626dadb799bd45eeb27269b Little endian MIPS architecture: http://security.debian.org/pool/updates/main/liba/libast1/libast1_0.4-3woody2_mipsel.deb Size/MD5 checksum: 24932 2b5ff0209b86917d9e31ca111e57dffb http://security.debian.org/pool/updates/main/liba/libast1/libast1-dev_0.4-3woody2_mipsel.deb Size/MD5 checksum: 40440 ec95a2b1e72608b7deb882df9b7d7eef PowerPC architecture: http://security.debian.org/pool/updates/main/liba/libast1/libast1_0.4-3woody2_powerpc.deb Size/MD5 checksum: 28186 ec060589a8ac75ebb4da6cf071698503 http://security.debian.org/pool/updates/main/liba/libast1/libast1-dev_0.4-3woody2_powerpc.deb Size/MD5 checksum: 41774 9ebee23c3319be0192868528f3f82c36 IBM S/390 architecture: http://security.debian.org/pool/updates/main/liba/libast1/libast1_0.4-3woody2_s390.deb Size/MD5 checksum: 27124 f7a1cd1dff3d333919825565958c36d1 http://security.debian.org/pool/updates/main/liba/libast1/libast1-dev_0.4-3woody2_s390.deb Size/MD5 checksum: 33494 48314490169bae367f5e93dedc58b6a0 Sun Sparc architecture: http://security.debian.org/pool/updates/main/liba/libast1/libast1_0.4-3woody2_sparc.deb Size/MD5 checksum: 30330 c620f4c7d89db5f750a1ba792d8f5f95 http://security.debian.org/pool/updates/main/liba/libast1/libast1-dev_0.4-3woody2_sparc.deb Size/MD5 checksum: 38862 50c09ef80e55176619c4b65ea0191bc2 Debian GNU/Linux 3.1 alias sarge - -------------------------------- Source archives: http://security.debian.org/pool/updates/main/liba/libast/libast_0.6-0pre2003010606sarge1.dsc Size/MD5 checksum: 576 9420ee95768da2f860552aac0b32b5e6 http://security.debian.org/pool/updates/main/liba/libast/libast_0.6-0pre2003010606sarge1.tar.gz Size/MD5 checksum: 390719 52a0ee946d87bdf807d0a18b71bbf5e2 Alpha architecture: http://security.debian.org/pool/updates/main/liba/libast/libast2_0.6-0pre2003010606sarge1_alpha.deb Size/MD5 checksum: 67308 524177839f05a53e16da08d221cf4270 http://security.debian.org/pool/updates/main/liba/libast/libast2-dev_0.6-0pre2003010606sarge1_alpha.deb Size/MD5 checksum: 127226 6dad9a361f0ec9550bfb06325f6eca9b AMD64 architecture: http://security.debian.org/pool/updates/main/liba/libast/libast2_0.6-0pre2003010606sarge1_amd64.deb Size/MD5 checksum: 63212 5274afc640d0abb29f71c8445506aa6c http://security.debian.org/pool/updates/main/liba/libast/libast2-dev_0.6-0pre2003010606sarge1_amd64.deb Size/MD5 checksum: 94440 43c04d451f85e18b68be0fc83d62fdd9 ARM architecture: http://security.debian.org/pool/updates/main/liba/libast/libast2_0.6-0pre2003010606sarge1_arm.deb Size/MD5 checksum: 55832 4987f49c1ed5d819cb91386474216675 http://security.debian.org/pool/updates/main/liba/libast/libast2-dev_0.6-0pre2003010606sarge1_arm.deb Size/MD5 checksum: 90590 09e5736d3ae6ba985dcc86607536aad3 Intel IA-32 architecture: http://security.debian.org/pool/updates/main/liba/libast/libast2_0.6-0pre2003010606sarge1_i386.deb Size/MD5 checksum: 56184 3baf39df1af7fb0370f1487d97fa328d http://security.debian.org/pool/updates/main/liba/libast/libast2-dev_0.6-0pre2003010606sarge1_i386.deb Size/MD5 checksum: 84908 26f77c7997a59f621d3ec32a563fd0f4 Intel IA-64 architecture: http://security.debian.org/pool/updates/main/liba/libast/libast2_0.6-0pre2003010606sarge1_ia64.deb Size/MD5 checksum: 77708 744fe6d6a70465912b66f42e7ab0f650 http://security.debian.org/pool/updates/main/liba/libast/libast2-dev_0.6-0pre2003010606sarge1_ia64.deb Size/MD5 checksum: 123406 7e47159f62b98acce66f18aa1fb3059a HP Precision architecture: http://security.debian.org/pool/updates/main/liba/libast/libast2_0.6-0pre2003010606sarge1_hppa.deb Size/MD5 checksum: 65842 3a61b0d8cfb2b93da56bca7695ab34c5 http://security.debian.org/pool/updates/main/liba/libast/libast2-dev_0.6-0pre2003010606sarge1_hppa.deb Size/MD5 checksum: 104328 da13a39f4f86b7b06f18e143e6697a9b Motorola 680x0 architecture: http://security.debian.org/pool/updates/main/liba/libast/libast2_0.6-0pre2003010606sarge1_m68k.deb Size/MD5 checksum: 54526 df42f2ef3b882894e5d7062474a03f7a http://security.debian.org/pool/updates/main/liba/libast/libast2-dev_0.6-0pre2003010606sarge1_m68k.deb Size/MD5 checksum: 80642 4f3f46861e8cf01acfa83c5cb99761e6 Big endian MIPS architecture: http://security.debian.org/pool/updates/main/liba/libast/libast2_0.6-0pre2003010606sarge1_mips.deb Size/MD5 checksum: 55404 0fe139bd8d3ab4082b0368418158e5cf http://security.debian.org/pool/updates/main/liba/libast/libast2-dev_0.6-0pre2003010606sarge1_mips.deb Size/MD5 checksum: 100148 842ed436fd72d2763551d0b5c727f6f0 Little endian MIPS architecture: http://security.debian.org/pool/updates/main/liba/libast/libast2_0.6-0pre2003010606sarge1_mipsel.deb Size/MD5 checksum: 55708 e6fef4a2764657e3a6c5379ad4ca734b http://security.debian.org/pool/updates/main/liba/libast/libast2-dev_0.6-0pre2003010606sarge1_mipsel.deb Size/MD5 checksum: 99892 8006e1709f1170b4cb68f12029abf246 PowerPC architecture: http://security.debian.org/pool/updates/main/liba/libast/libast2_0.6-0pre2003010606sarge1_powerpc.deb Size/MD5 checksum: 58540 51c6c2e4c1e31f127995e5b2305f0e4b http://security.debian.org/pool/updates/main/liba/libast/libast2-dev_0.6-0pre2003010606sarge1_powerpc.deb Size/MD5 checksum: 98048 fabbf05a9a0d89b311cfc6153d807fcc IBM S/390 architecture: http://security.debian.org/pool/updates/main/liba/libast/libast2_0.6-0pre2003010606sarge1_s390.deb Size/MD5 checksum: 63928 78518a64a55be0d18f82ec1610e756dc http://security.debian.org/pool/updates/main/liba/libast/libast2-dev_0.6-0pre2003010606sarge1_s390.deb Size/MD5 checksum: 90818 0c68ab4af0d61a5a5e5cce80827c81ca Sun Sparc architecture: http://security.debian.org/pool/updates/main/liba/libast/libast2_0.6-0pre2003010606sarge1_sparc.deb Size/MD5 checksum: 57060 8efa5b2512f3a5e209c7b5512d129479 http://security.debian.org/pool/updates/main/liba/libast/libast2-dev_0.6-0pre2003010606sarge1_sparc.deb Size/MD5 checksum: 91510 abb85b30007dbe82c7a20b4040d4e7aa These files will probably be moved into the stable distribution on its next update. - --------------------------------------------------------------------------------- For apt-get: deb http://security.debian.org/ stable/updates main For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main Mailing list: debian-security-announce@lists.debian.org Package info: `apt-cache show ' and http://packages.debian.org/ -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.2 (GNU/Linux) iD8DBQFD80ltW5ql+IAeqTIRAjqIAJ9pUmM/7E63Jj0VXLGxHKRAGzWYoQCfbPgj RbQ41SFEjoyCy4uznM2psq4= =4TVY -----END PGP SIGNATURE----- _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/