Welcome to Gaia! ::

The Official Linux Users of Gaia

Back to Guilds

A Guild for Linux, BSD, Mac, Solaris, and other Unix like operating systems. 

Tags: Computer Help, Linux, BSD (Berkeley Software Distrobution), Mac (Macintosh), Unix 

Reply Linux Security, keeping you on top of the bugs!
Debian 08/02/2009 (x2)

Quick Reply

Enter both words below, separated by a space:

Can't read the text? Click here

Submit

vendion Gear
Captain

PostPosted: Sun Aug 02, 2009 8:28 pm


- ------------------------------------------------------------------------
Debian Security Advisory DSA-1848-1 security@debian.org
http://www.debian.org/security/ Florian Weimer
August 02, 2009 http://www.debian.org/security/faq
- ------------------------------------------------------------------------

Package : znc
Vulnerability : directory traversal
Problem type : remote
Debian-specific: no
Debian Bug : 537977

It was discovered that znc, an IRC proxy, did not properly process
certain DCC requests, allowing attackers to upload arbitrary files.

For the old stable distribution (etch), this problem has been fixed in
version 0.045-3+etch3.

For the stable distribution (lenny), this problem has been fixed in
version 0.058-2+lenny3.

For the unstable distribution (sid), this problem has been fixed in
version 0.074-1.

We recommend that you upgrade your znc package.

Upgrade instructions
- --------------------

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
will update the internal database
apt-get upgrade
will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 4.0 alias etch
- -------------------------------

Source archives:

http://security.debian.org/pool/updates/main/z/znc/znc_0.045-3+etch3.dsc
Size/MD5 checksum: 667 933a585b14d230df9dd1a8b6ee5ad4b6
http://security.debian.org/pool/updates/main/z/znc/znc_0.045-3+etch3.diff.gz
Size/MD5 checksum: 14501 330d9e4ac7894dbfec53bf9cf1e52660
http://security.debian.org/pool/updates/main/z/znc/znc_0.045.orig.tar.gz
Size/MD5 checksum: 204863 9a514b125b7514811fd03befa73cce77

alpha architecture (DEC Alpha)

http://security.debian.org/pool/updates/main/z/znc/znc_0.045-3+etch3_alpha.deb
Size/MD5 checksum: 863536 a49fb4cba67de68d20b9da2cd8867362

amd64 architecture (AMD x86_64 (AMD64))

http://security.debian.org/pool/updates/main/z/znc/znc_0.045-3+etch3_amd64.deb
Size/MD5 checksum: 794176 ed5f4fe35ce0a2550aa16a423e100065

arm architecture (ARM)

http://security.debian.org/pool/updates/main/z/znc/znc_0.045-3+etch3_arm.deb
Size/MD5 checksum: 906432 f49d4961b57febdbc184146bbc0aca2f

hppa architecture (HP PA RISC)

http://security.debian.org/pool/updates/main/z/znc/znc_0.045-3+etch3_hppa.deb
Size/MD5 checksum: 860972 659a6b3b95f80220b8c55fc54c7c1657

i386 architecture (Intel ia32)

http://security.debian.org/pool/updates/main/z/znc/znc_0.045-3+etch3_i386.deb
Size/MD5 checksum: 811820 e2ed63396c2813e5e8a064ab5b4ac646

ia64 architecture (Intel ia64)

http://security.debian.org/pool/updates/main/z/znc/znc_0.045-3+etch3_ia64.deb
Size/MD5 checksum: 963774 37187a7fb2cc43d51e8112330311334a

mips architecture (MIPS (Big Endian))

http://security.debian.org/pool/updates/main/z/znc/znc_0.045-3+etch3_mips.deb
Size/MD5 checksum: 716040 9f206ba9ef54ff3658bbf62c5ec448b5

mipsel architecture (MIPS (Little Endian))

http://security.debian.org/pool/updates/main/z/znc/znc_0.045-3+etch3_mipsel.deb
Size/MD5 checksum: 714202 272cbc77e814fb6ef155e0cd33a1fcbe

powerpc architecture (PowerPC)

http://security.debian.org/pool/updates/main/z/znc/znc_0.045-3+etch3_powerpc.deb
Size/MD5 checksum: 793154 84bb601bf6ebf409fbca63545b37c123

s390 architecture (IBM S/390)

http://security.debian.org/pool/updates/main/z/znc/znc_0.045-3+etch3_s390.deb
Size/MD5 checksum: 735198 67f86f69500e96461d1cea10fead09a9

sparc architecture (Sun SPARC/UltraSPARC)

http://security.debian.org/pool/updates/main/z/znc/znc_0.045-3+etch3_sparc.deb
Size/MD5 checksum: 751090 1a0088824517b4f542e9589febc25536

Debian GNU/Linux 5.0 alias lenny
- --------------------------------

Source archives:

http://security.debian.org/pool/updates/main/z/znc/znc_0.058-2+lenny3.dsc
Size/MD5 checksum: 1037 93fe1b9b7bd7aeebd7b3e0c3854a477f
http://security.debian.org/pool/updates/main/z/znc/znc_0.058-2+lenny3.diff.gz
Size/MD5 checksum: 9628 6fd05e2dbb8e6796dcc647bd79e9d1a0
http://security.debian.org/pool/updates/main/z/znc/znc_0.058.orig.tar.gz
Size/MD5 checksum: 340741 c02fd740c55d5b3a7912f7584344103e

alpha architecture (DEC Alpha)

http://security.debian.org/pool/updates/main/z/znc/znc_0.058-2+lenny3_alpha.deb
Size/MD5 checksum: 1096456 18a4159f41d3b931b31f98b84d2fb269

amd64 architecture (AMD x86_64 (AMD64))

http://security.debian.org/pool/updates/main/z/znc/znc_0.058-2+lenny3_amd64.deb
Size/MD5 checksum: 1031744 bc265fa88c9bb707b67e757b63ed5853

arm architecture (ARM)

http://security.debian.org/pool/updates/main/z/znc/znc_0.058-2+lenny3_arm.deb
Size/MD5 checksum: 1152106 dbf436ac4085fa58d3d51c6f9b642c16

armel architecture (ARM EABI)

http://security.debian.org/pool/updates/main/z/znc/znc_0.058-2+lenny3_armel.deb
Size/MD5 checksum: 964084 fe6c30329c2deb11d40875b8642d3127

hppa architecture (HP PA RISC)

http://security.debian.org/pool/updates/main/z/znc/znc_0.058-2+lenny3_hppa.deb
Size/MD5 checksum: 1164842 cf1a064e2ece7df88b9d4b9370811d8b

i386 architecture (Intel ia32)

http://security.debian.org/pool/updates/main/z/znc/znc_0.058-2+lenny3_i386.deb
Size/MD5 checksum: 1010412 654653749e84562db775a6dfd1ca3ebd

ia64 architecture (Intel ia64)

http://security.debian.org/pool/updates/main/z/znc/znc_0.058-2+lenny3_ia64.deb
Size/MD5 checksum: 1183120 31579bc427d4cf4f941b3aea648740d2

mips architecture (MIPS (Big Endian))

http://security.debian.org/pool/updates/main/z/znc/znc_0.058-2+lenny3_mips.deb
Size/MD5 checksum: 915526 a94198400fd7832802260953d8f10acb

mipsel architecture (MIPS (Little Endian))

http://security.debian.org/pool/updates/main/z/znc/znc_0.058-2+lenny3_mipsel.deb
Size/MD5 checksum: 907738 b794ceddef5b50eb6ecad8b16aaff23b

powerpc architecture (PowerPC)

http://security.debian.org/pool/updates/main/z/znc/znc_0.058-2+lenny3_powerpc.deb
Size/MD5 checksum: 1035914 3176e289856565c20528b779b5dd5b65

s390 architecture (IBM S/390)

http://security.debian.org/pool/updates/main/z/znc/znc_0.058-2+lenny3_s390.deb
Size/MD5 checksum: 971812 b51b7e7bb2d2b26ac7619a2db5274def

sparc architecture (Sun SPARC/UltraSPARC)

http://security.debian.org/pool/updates/main/z/znc/znc_0.058-2+lenny3_sparc.deb
Size/MD5 checksum: 1003518 681f3ddd6b61aaae7329b3835d926978


These files will probably be moved into the stable distribution on
its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
PostPosted: Sun Aug 02, 2009 8:29 pm


- ------------------------------------------------------------------------
Debian Security Advisory DSA-1849-1 security@debian.org
http://www.debian.org/security/ Florian Weimer
August 02, 2009 http://www.debian.org/security/faq
- ------------------------------------------------------------------------

Package : xml-security-c
Vulnerability : design flaw
Problem type : local (remote)
Debian-specific: no
CVE Id(s) : CVE-2009-0217
CERT advisory : VU#466161

It was discovered that the W3C XML Signature recommendation contains a
protocol-level vulnerability related to HMAC output truncation. This
update implements the proposed workaround in the C++ version of the
Apache implementation of this standard, xml-security-c, by preventing
truncation to output strings shorter than 80 bits or half of the
original HMAC output, whichever is greater.

For the old stable distribution (etch), this problem has been fixed in
version 1.2.1-3+etch1.

For the stable distribution (lenny), this problem has been fixed in
version 1.4.0-3+lenny2.

For the unstable distribution (sid), this problem has been fixed in
version 1.4.0-4.

We recommend that you upgrade your xml-security-c packages.

Upgrade instructions
- --------------------

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
will update the internal database
apt-get upgrade
will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 4.0 alias etch
- -------------------------------

Source archives:

http://security.debian.org/pool/updates/main/x/xml-security-c/xml-security-c_1.2.1.orig.tar.gz
Size/MD5 checksum: 2560698 c8cfd893e0d13c08e6cdffc1b02d431c
http://security.debian.org/pool/updates/main/x/xml-security-c/xml-security-c_1.2.1-3+etch1.diff.gz
Size/MD5 checksum: 9397 eee96ead16c0fe740d1e323bde905830
http://security.debian.org/pool/updates/main/x/xml-security-c/xml-security-c_1.2.1-3+etch1.dsc
Size/MD5 checksum: 798 7c376bd95337c43d4de11ea3a75a24f5

Architecture independent packages:

http://security.debian.org/pool/updates/main/x/xml-security-c/libxml-security-c-doc_1.2.1-3+etch1_all.deb
Size/MD5 checksum: 1845748 ee0ffa05b1b60925e38f3fca562a08eb

alpha architecture (DEC Alpha)

http://security.debian.org/pool/updates/main/x/xml-security-c/libxml-security-c-dev_1.2.1-3+etch1_alpha.deb
Size/MD5 checksum: 119938 d31ec89d90362667221233b6296e4cb0
http://security.debian.org/pool/updates/main/x/xml-security-c/libxml-security-c12_1.2.1-3+etch1_alpha.deb
Size/MD5 checksum: 312956 b2ad9dd61644639f572f4e1bcb00965d

amd64 architecture (AMD x86_64 (AMD64))

http://security.debian.org/pool/updates/main/x/xml-security-c/libxml-security-c12_1.2.1-3+etch1_amd64.deb
Size/MD5 checksum: 291372 9c218c654a24213f98ba3222d8337f7a
http://security.debian.org/pool/updates/main/x/xml-security-c/libxml-security-c-dev_1.2.1-3+etch1_amd64.deb
Size/MD5 checksum: 119084 020bfb03a4736b0478d645510d86953f

arm architecture (ARM)

http://security.debian.org/pool/updates/main/x/xml-security-c/libxml-security-c12_1.2.1-3+etch1_arm.deb
Size/MD5 checksum: 304896 b6c3dcda88a74d359218f220deaea2b5
http://security.debian.org/pool/updates/main/x/xml-security-c/libxml-security-c-dev_1.2.1-3+etch1_arm.deb
Size/MD5 checksum: 120304 cd7487c6c571d6e0a002e3a2cd59e05e

hppa architecture (HP PA RISC)

http://security.debian.org/pool/updates/main/x/xml-security-c/libxml-security-c-dev_1.2.1-3+etch1_hppa.deb
Size/MD5 checksum: 121356 f138d0eecdb09e5d06760fcb897332a8
http://security.debian.org/pool/updates/main/x/xml-security-c/libxml-security-c12_1.2.1-3+etch1_hppa.deb
Size/MD5 checksum: 361032 f70bcaf5d4b9868fee5477c5e4681dab

i386 architecture (Intel ia32)

http://security.debian.org/pool/updates/main/x/xml-security-c/libxml-security-c12_1.2.1-3+etch1_i386.deb
Size/MD5 checksum: 293276 18d5996d062d21bd6af815c80bda5b1a
http://security.debian.org/pool/updates/main/x/xml-security-c/libxml-security-c-dev_1.2.1-3+etch1_i386.deb
Size/MD5 checksum: 120864 b2a8f94634550d36369326943ed53baf

ia64 architecture (Intel ia64)

http://security.debian.org/pool/updates/main/x/xml-security-c/libxml-security-c-dev_1.2.1-3+etch1_ia64.deb
Size/MD5 checksum: 119930 c3ceb9e692852962d25e708016a7a434
http://security.debian.org/pool/updates/main/x/xml-security-c/libxml-security-c12_1.2.1-3+etch1_ia64.deb
Size/MD5 checksum: 350184 f15bfec431e30ada442c43be1f5a91ff

mips architecture (MIPS (Big Endian))

http://security.debian.org/pool/updates/main/x/xml-security-c/libxml-security-c-dev_1.2.1-3+etch1_mips.deb
Size/MD5 checksum: 119942 bae859241d611a240ae5b9249f120f38
http://security.debian.org/pool/updates/main/x/xml-security-c/libxml-security-c12_1.2.1-3+etch1_mips.deb
Size/MD5 checksum: 276032 7d5d2977f75703715df6f2adca648793

mipsel architecture (MIPS (Little Endian))

http://security.debian.org/pool/updates/main/x/xml-security-c/libxml-security-c-dev_1.2.1-3+etch1_mipsel.deb
Size/MD5 checksum: 119946 e1f515b9ba927eba7545f1f70d8c8d64
http://security.debian.org/pool/updates/main/x/xml-security-c/libxml-security-c12_1.2.1-3+etch1_mipsel.deb
Size/MD5 checksum: 266602 f498800151d86f9094b5cbefd1b7ad96

powerpc architecture (PowerPC)

http://security.debian.org/pool/updates/main/x/xml-security-c/libxml-security-c-dev_1.2.1-3+etch1_powerpc.deb
Size/MD5 checksum: 119950 2601f8c882c496450ef12932d946e4cd
http://security.debian.org/pool/updates/main/x/xml-security-c/libxml-security-c12_1.2.1-3+etch1_powerpc.deb
Size/MD5 checksum: 295310 cfe7e0e8a0cc973f1d31b7c5e626b3fd

s390 architecture (IBM S/390)

http://security.debian.org/pool/updates/main/x/xml-security-c/libxml-security-c-dev_1.2.1-3+etch1_s390.deb
Size/MD5 checksum: 119926 e22f0b7723656aa4d290e0115d68de10
http://security.debian.org/pool/updates/main/x/xml-security-c/libxml-security-c12_1.2.1-3+etch1_s390.deb
Size/MD5 checksum: 292112 326eff9008b42bc0a31e728a0a8bc610

sparc architecture (Sun SPARC/UltraSPARC)

http://security.debian.org/pool/updates/main/x/xml-security-c/libxml-security-c-dev_1.2.1-3+etch1_sparc.deb
Size/MD5 checksum: 119836 c9f19d8e98ab76ea89b41e46b11d7036
http://security.debian.org/pool/updates/main/x/xml-security-c/libxml-security-c12_1.2.1-3+etch1_sparc.deb
Size/MD5 checksum: 298112 bbbf2e5caba79d70ac1e90022bb6a9fb

Debian GNU/Linux 5.0 alias lenny
- --------------------------------

Source archives:

http://security.debian.org/pool/updates/main/x/xml-security-c/xml-security-c_1.4.0.orig.tar.gz
Size/MD5 checksum: 934876 dd9accf6727eb008dbf1dd674d5d4dcc
http://security.debian.org/pool/updates/main/x/xml-security-c/xml-security-c_1.4.0-3+lenny2.dsc
Size/MD5 checksum: 1378 f29c4e9daf89733b4f5351b6832d30d1
http://security.debian.org/pool/updates/main/x/xml-security-c/xml-security-c_1.4.0-3+lenny2.diff.gz
Size/MD5 checksum: 6299 f9c531ccd6d81f8cdf1c3e1a14452ce9

alpha architecture (DEC Alpha)

http://security.debian.org/pool/updates/main/x/xml-security-c/libxml-security-c14_1.4.0-3+lenny2_alpha.deb
Size/MD5 checksum: 403536 2be5f3c78a7d136343f41db631f35dbf
http://security.debian.org/pool/updates/main/x/xml-security-c/libxml-security-c-dev_1.4.0-3+lenny2_alpha.deb
Size/MD5 checksum: 137174 3083a6152fe3503df12bded2d585bbac

amd64 architecture (AMD x86_64 (AMD64))

http://security.debian.org/pool/updates/main/x/xml-security-c/libxml-security-c-dev_1.4.0-3+lenny2_amd64.deb
Size/MD5 checksum: 137140 cfda58e00bc0e4d0c0659bae97e8b618
http://security.debian.org/pool/updates/main/x/xml-security-c/libxml-security-c14_1.4.0-3+lenny2_amd64.deb
Size/MD5 checksum: 373934 df07b72b5b4c62e047771bacdb5362db

arm architecture (ARM)

http://security.debian.org/pool/updates/main/x/xml-security-c/libxml-security-c14_1.4.0-3+lenny2_arm.deb
Size/MD5 checksum: 378166 d4b08d9ad7c4376d8365e77058007110
http://security.debian.org/pool/updates/main/x/xml-security-c/libxml-security-c-dev_1.4.0-3+lenny2_arm.deb
Size/MD5 checksum: 138626 92c35b8c5f7e224d55f4b0d0430f616d

armel architecture (ARM EABI)

http://security.debian.org/pool/updates/main/x/xml-security-c/libxml-security-c14_1.4.0-3+lenny2_armel.deb
Size/MD5 checksum: 305848 aacf870726bf8ab6ec17aaf7b0cdcfdf
http://security.debian.org/pool/updates/main/x/xml-security-c/libxml-security-c-dev_1.4.0-3+lenny2_armel.deb
Size/MD5 checksum: 140072 625c396cf269bf753511744d84e63182

hppa architecture (HP PA RISC)

http://security.debian.org/pool/updates/main/x/xml-security-c/libxml-security-c-dev_1.4.0-3+lenny2_hppa.deb
Size/MD5 checksum: 140120 c42442f8a13b412e76c26be15018452e
http://security.debian.org/pool/updates/main/x/xml-security-c/libxml-security-c14_1.4.0-3+lenny2_hppa.deb
Size/MD5 checksum: 417920 7d37c2e4a92bbf6d00a6a66e0bf79ec0

i386 architecture (Intel ia32)

http://security.debian.org/pool/updates/main/x/xml-security-c/libxml-security-c14_1.4.0-3+lenny2_i386.deb
Size/MD5 checksum: 367904 5119c1cff8e8ca5a1e0378d6a7a993c6
http://security.debian.org/pool/updates/main/x/xml-security-c/libxml-security-c-dev_1.4.0-3+lenny2_i386.deb
Size/MD5 checksum: 139746 7ac6a75066e66941c015836bf249d2d5

ia64 architecture (Intel ia64)

http://security.debian.org/pool/updates/main/x/xml-security-c/libxml-security-c-dev_1.4.0-3+lenny2_ia64.deb
Size/MD5 checksum: 137162 ae3815bb28e9f541c6d465fa02ccb3ca
http://security.debian.org/pool/updates/main/x/xml-security-c/libxml-security-c14_1.4.0-3+lenny2_ia64.deb
Size/MD5 checksum: 443176 ab99f41436d699969a99e10c9b302fb5

mips architecture (MIPS (Big Endian))

http://security.debian.org/pool/updates/main/x/xml-security-c/libxml-security-c-dev_1.4.0-3+lenny2_mips.deb
Size/MD5 checksum: 137212 5f80e137ea0990adafcb95780c8ac40e
http://security.debian.org/pool/updates/main/x/xml-security-c/libxml-security-c14_1.4.0-3+lenny2_mips.deb
Size/MD5 checksum: 317060 e1cfbea0ebd764a7aa0cd3e036451ba3

mipsel architecture (MIPS (Little Endian))

http://security.debian.org/pool/updates/main/x/xml-security-c/libxml-security-c-dev_1.4.0-3+lenny2_mipsel.deb
Size/MD5 checksum: 137210 800e1daa075a066a3eddaf0d70109396
http://security.debian.org/pool/updates/main/x/xml-security-c/libxml-security-c14_1.4.0-3+lenny2_mipsel.deb
Size/MD5 checksum: 307406 b1a81ab15d51331594a012128626381d

powerpc architecture (PowerPC)

http://security.debian.org/pool/updates/main/x/xml-security-c/libxml-security-c-dev_1.4.0-3+lenny2_powerpc.deb
Size/MD5 checksum: 139754 290d64a32f56eb8c937c0f980545dc92
http://security.debian.org/pool/updates/main/x/xml-security-c/libxml-security-c14_1.4.0-3+lenny2_powerpc.deb
Size/MD5 checksum: 394974 0a743cf7c858f323e2218782164ebd88

s390 architecture (IBM S/390)

http://security.debian.org/pool/updates/main/x/xml-security-c/libxml-security-c14_1.4.0-3+lenny2_s390.deb
Size/MD5 checksum: 354552 a533a33dcde0fcfa971044b7937e6fde
http://security.debian.org/pool/updates/main/x/xml-security-c/libxml-security-c-dev_1.4.0-3+lenny2_s390.deb
Size/MD5 checksum: 137140 19a74b4629a160c17a16e1bd68d0d12e

sparc architecture (Sun SPARC/UltraSPARC)

http://security.debian.org/pool/updates/main/x/xml-security-c/libxml-security-c14_1.4.0-3+lenny2_sparc.deb
Size/MD5 checksum: 361628 d35cd24bf41aedd439497e3bf6427466
http://security.debian.org/pool/updates/main/x/xml-security-c/libxml-security-c-dev_1.4.0-3+lenny2_sparc.deb
Size/MD5 checksum: 139732 b88f0bb712cc35216fa05ae433f916d0


These files will probably be moved into the stable distribution on
its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org

vendion Gear
Captain

Reply
Linux Security, keeping you on top of the bugs!

 
Manage Your Items
Other Stuff
Get GCash
Offers
Get Items
More Items
Where Everyone Hangs Out
Other Community Areas
Virtual Spaces
Fun Stuff
Gaia's Games
Mini-Games
Play with GCash
Play with Platinum