The Debian Security Team published a new security update for Debian GNU/Linux. Here the announcement:
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
- --------------------------------------------------------------------------
Debian Security Advisory DSA 976-1 security@debian.org
http://www.debian.org/security/ Martin Schulze
February 15th, 2006 http://www.debian.org/security/faq
- --------------------------------------------------------------------------
Package : libast, libast1
Vulnerability : buffer overflow
Problem type : local
Debian-specific: no
CVE ID : CVE-2006-0224
Johnny Mast discovered a buffer overflow in libast, the library of
assorted spiffy things, that can lead to the execution of arbitary
code. This library is used by eterm which is installed setgid uid
which leads to a vulnerability to alter the utmp file.
For the old stable distribution (woody) this problem has been fixed in
version 0.4-3woody2.
For the stable distribution (sarge) this problem has been fixed in
version 0.6-0pre2003010606sarge1.
For the unstable distribution (sid) this problem will be fixed soon.
We recommend that you upgrade your libast packages.
Upgrade Instructions
- --------------------
wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.
If you are using the apt-get package manager, use the line for
sources.list as given below:
apt-get update
will update the internal database
apt-get upgrade
will install corrected packages
You may use an automated update by adding the resources from the
footer to the proper configuration.
Debian GNU/Linux 3.0 alias woody
- --------------------------------
Source archives:
http://security.debian.org/pool/updates/main/liba/libast1/libast1_0.4-3woody2.dsc
Size/MD5 checksum: 611 7ae117d391242963294499b684e783b6
http://security.debian.org/pool/updates/main/liba/libast1/libast1_0.4-3woody2.diff.gz
Size/MD5 checksum: 127092 fd7f99bde6a540fe50c27761b63e27cf
http://security.debian.org/pool/updates/main/liba/libast1/libast1_0.4.orig.tar.gz
Size/MD5 checksum: 150283 9424286314c1d816699b28964b91d015
Alpha architecture:
http://security.debian.org/pool/updates/main/liba/libast1/libast1_0.4-3woody2_alpha.deb
Size/MD5 checksum: 30314 549273ceedb6d3836361ec4308df13b7
http://security.debian.org/pool/updates/main/liba/libast1/libast1-dev_0.4-3woody2_alpha.deb
Size/MD5 checksum: 46418 324e44548cf1c1ae9befb810f3ebc3cc
ARM architecture:
http://security.debian.org/pool/updates/main/liba/libast1/libast1_0.4-3woody2_arm.deb
Size/MD5 checksum: 28496 702865048ba5822eef10de3cd9007819
http://security.debian.org/pool/updates/main/liba/libast1/libast1-dev_0.4-3woody2_arm.deb
Size/MD5 checksum: 37076 e454fa52adb41c91c0e9b806caf1418c
Intel IA-32 architecture:
http://security.debian.org/pool/updates/main/liba/libast1/libast1_0.4-3woody2_i386.deb
Size/MD5 checksum: 24804 cb4f324b197dad2f1069af530e1f7051
http://security.debian.org/pool/updates/main/liba/libast1/libast1-dev_0.4-3woody2_i386.deb
Size/MD5 checksum: 33096 2eae854498d4ee6a27badcf8603cab7e
Intel IA-64 architecture:
http://security.debian.org/pool/updates/main/liba/libast1/libast1_0.4-3woody2_ia64.deb
Size/MD5 checksum: 37426 fab097ad84832a872a0af9f6b61a4db7
http://security.debian.org/pool/updates/main/liba/libast1/libast1-dev_0.4-3woody2_ia64.deb
Size/MD5 checksum: 47926 530f9e8878f21ee1f2dbcb0dbd16db7d
HP Precision architecture:
http://security.debian.org/pool/updates/main/liba/libast1/libast1_0.4-3woody2_hppa.deb
Size/MD5 checksum: 30870 9c9be1baeb94f828c281db145cac7e45
http://security.debian.org/pool/updates/main/liba/libast1/libast1-dev_0.4-3woody2_hppa.deb
Size/MD5 checksum: 45820 e782f8f5846a48d7eb8a2791c61255e8
Motorola 680x0 architecture:
http://security.debian.org/pool/updates/main/liba/libast1/libast1_0.4-3woody2_m68k.deb
Size/MD5 checksum: 25178 4293a0569fb9f3266e8644e332c1f2bf
http://security.debian.org/pool/updates/main/liba/libast1/libast1-dev_0.4-3woody2_m68k.deb
Size/MD5 checksum: 32990 b78f08fede449151bde20f5b4ee82ea2
Big endian MIPS architecture:
http://security.debian.org/pool/updates/main/liba/libast1/libast1_0.4-3woody2_mips.deb
Size/MD5 checksum: 24826 ccdf8838e4a6c7c7ecc29916d76af616
http://security.debian.org/pool/updates/main/liba/libast1/libast1-dev_0.4-3woody2_mips.deb
Size/MD5 checksum: 40754 9ea070dc4626dadb799bd45eeb27269b
Little endian MIPS architecture:
http://security.debian.org/pool/updates/main/liba/libast1/libast1_0.4-3woody2_mipsel.deb
Size/MD5 checksum: 24932 2b5ff0209b86917d9e31ca111e57dffb
http://security.debian.org/pool/updates/main/liba/libast1/libast1-dev_0.4-3woody2_mipsel.deb
Size/MD5 checksum: 40440 ec95a2b1e72608b7deb882df9b7d7eef
PowerPC architecture:
http://security.debian.org/pool/updates/main/liba/libast1/libast1_0.4-3woody2_powerpc.deb
Size/MD5 checksum: 28186 ec060589a8ac75ebb4da6cf071698503
http://security.debian.org/pool/updates/main/liba/libast1/libast1-dev_0.4-3woody2_powerpc.deb
Size/MD5 checksum: 41774 9ebee23c3319be0192868528f3f82c36
IBM S/390 architecture:
http://security.debian.org/pool/updates/main/liba/libast1/libast1_0.4-3woody2_s390.deb
Size/MD5 checksum: 27124 f7a1cd1dff3d333919825565958c36d1
http://security.debian.org/pool/updates/main/liba/libast1/libast1-dev_0.4-3woody2_s390.deb
Size/MD5 checksum: 33494 48314490169bae367f5e93dedc58b6a0
Sun Sparc architecture:
http://security.debian.org/pool/updates/main/liba/libast1/libast1_0.4-3woody2_sparc.deb
Size/MD5 checksum: 30330 c620f4c7d89db5f750a1ba792d8f5f95
http://security.debian.org/pool/updates/main/liba/libast1/libast1-dev_0.4-3woody2_sparc.deb
Size/MD5 checksum: 38862 50c09ef80e55176619c4b65ea0191bc2
Debian GNU/Linux 3.1 alias sarge
- --------------------------------
Source archives:
http://security.debian.org/pool/updates/main/liba/libast/libast_0.6-0pre2003010606sarge1.dsc
Size/MD5 checksum: 576 9420ee95768da2f860552aac0b32b5e6
http://security.debian.org/pool/updates/main/liba/libast/libast_0.6-0pre2003010606sarge1.tar.gz
Size/MD5 checksum: 390719 52a0ee946d87bdf807d0a18b71bbf5e2
Alpha architecture:
http://security.debian.org/pool/updates/main/liba/libast/libast2_0.6-0pre2003010606sarge1_alpha.deb
Size/MD5 checksum: 67308 524177839f05a53e16da08d221cf4270
http://security.debian.org/pool/updates/main/liba/libast/libast2-dev_0.6-0pre2003010606sarge1_alpha.deb
Size/MD5 checksum: 127226 6dad9a361f0ec9550bfb06325f6eca9b
AMD64 architecture:
http://security.debian.org/pool/updates/main/liba/libast/libast2_0.6-0pre2003010606sarge1_amd64.deb
Size/MD5 checksum: 63212 5274afc640d0abb29f71c8445506aa6c
http://security.debian.org/pool/updates/main/liba/libast/libast2-dev_0.6-0pre2003010606sarge1_amd64.deb
Size/MD5 checksum: 94440 43c04d451f85e18b68be0fc83d62fdd9
ARM architecture:
http://security.debian.org/pool/updates/main/liba/libast/libast2_0.6-0pre2003010606sarge1_arm.deb
Size/MD5 checksum: 55832 4987f49c1ed5d819cb91386474216675
http://security.debian.org/pool/updates/main/liba/libast/libast2-dev_0.6-0pre2003010606sarge1_arm.deb
Size/MD5 checksum: 90590 09e5736d3ae6ba985dcc86607536aad3
Intel IA-32 architecture:
http://security.debian.org/pool/updates/main/liba/libast/libast2_0.6-0pre2003010606sarge1_i386.deb
Size/MD5 checksum: 56184 3baf39df1af7fb0370f1487d97fa328d
http://security.debian.org/pool/updates/main/liba/libast/libast2-dev_0.6-0pre2003010606sarge1_i386.deb
Size/MD5 checksum: 84908 26f77c7997a59f621d3ec32a563fd0f4
Intel IA-64 architecture:
http://security.debian.org/pool/updates/main/liba/libast/libast2_0.6-0pre2003010606sarge1_ia64.deb
Size/MD5 checksum: 77708 744fe6d6a70465912b66f42e7ab0f650
http://security.debian.org/pool/updates/main/liba/libast/libast2-dev_0.6-0pre2003010606sarge1_ia64.deb
Size/MD5 checksum: 123406 7e47159f62b98acce66f18aa1fb3059a
HP Precision architecture:
http://security.debian.org/pool/updates/main/liba/libast/libast2_0.6-0pre2003010606sarge1_hppa.deb
Size/MD5 checksum: 65842 3a61b0d8cfb2b93da56bca7695ab34c5
http://security.debian.org/pool/updates/main/liba/libast/libast2-dev_0.6-0pre2003010606sarge1_hppa.deb
Size/MD5 checksum: 104328 da13a39f4f86b7b06f18e143e6697a9b
Motorola 680x0 architecture:
http://security.debian.org/pool/updates/main/liba/libast/libast2_0.6-0pre2003010606sarge1_m68k.deb
Size/MD5 checksum: 54526 df42f2ef3b882894e5d7062474a03f7a
http://security.debian.org/pool/updates/main/liba/libast/libast2-dev_0.6-0pre2003010606sarge1_m68k.deb
Size/MD5 checksum: 80642 4f3f46861e8cf01acfa83c5cb99761e6
Big endian MIPS architecture:
http://security.debian.org/pool/updates/main/liba/libast/libast2_0.6-0pre2003010606sarge1_mips.deb
Size/MD5 checksum: 55404 0fe139bd8d3ab4082b0368418158e5cf
http://security.debian.org/pool/updates/main/liba/libast/libast2-dev_0.6-0pre2003010606sarge1_mips.deb
Size/MD5 checksum: 100148 842ed436fd72d2763551d0b5c727f6f0
Little endian MIPS architecture:
http://security.debian.org/pool/updates/main/liba/libast/libast2_0.6-0pre2003010606sarge1_mipsel.deb
Size/MD5 checksum: 55708 e6fef4a2764657e3a6c5379ad4ca734b
http://security.debian.org/pool/updates/main/liba/libast/libast2-dev_0.6-0pre2003010606sarge1_mipsel.deb
Size/MD5 checksum: 99892 8006e1709f1170b4cb68f12029abf246
PowerPC architecture:
http://security.debian.org/pool/updates/main/liba/libast/libast2_0.6-0pre2003010606sarge1_powerpc.deb
Size/MD5 checksum: 58540 51c6c2e4c1e31f127995e5b2305f0e4b
http://security.debian.org/pool/updates/main/liba/libast/libast2-dev_0.6-0pre2003010606sarge1_powerpc.deb
Size/MD5 checksum: 98048 fabbf05a9a0d89b311cfc6153d807fcc
IBM S/390 architecture:
http://security.debian.org/pool/updates/main/liba/libast/libast2_0.6-0pre2003010606sarge1_s390.deb
Size/MD5 checksum: 63928 78518a64a55be0d18f82ec1610e756dc
http://security.debian.org/pool/updates/main/liba/libast/libast2-dev_0.6-0pre2003010606sarge1_s390.deb
Size/MD5 checksum: 90818 0c68ab4af0d61a5a5e5cce80827c81ca
Sun Sparc architecture:
http://security.debian.org/pool/updates/main/liba/libast/libast2_0.6-0pre2003010606sarge1_sparc.deb
Size/MD5 checksum: 57060 8efa5b2512f3a5e209c7b5512d129479
http://security.debian.org/pool/updates/main/liba/libast/libast2-dev_0.6-0pre2003010606sarge1_sparc.deb
Size/MD5 checksum: 91510 abb85b30007dbe82c7a20b4040d4e7aa
These files will probably be moved into the stable distribution on
its next update.
- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (GNU/Linux)
iD8DBQFD80ltW5ql+IAeqTIRAjqIAJ9pUmM/7E63Jj0VXLGxHKRAGzWYoQCfbPgj
RbQ41SFEjoyCy4uznM2psq4=
=4TVY
-----END PGP SIGNATURE-----