Debian: DSA-1895-1: New xmltooling packages fix potential code execution

    Date24 Sep 2009
    CategoryDebian
    28
    Posted ByLinuxSecurity Advisories
    Several vulnerabilities have been discovered in the xmltooling packages, as used by Shibboleth: Chris Ries discovered that decoding a crafted URL leads to a crash (and
    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA1
    
    - ------------------------------------------------------------------------
    Debian Security Advisory DSA-1895-1                  This email address is being protected from spambots. You need JavaScript enabled to view it.
    http://www.debian.org/security/                           Florian Weimer
    September 24, 2009                    http://www.debian.org/security/faq
    - ------------------------------------------------------------------------
    
    Package        : xmltooling
    Vulnerability  : several
    Problem type   : remote
    Debian-specific: no
    
    Several vulnerabilities have been discovered in the xmltooling packages,
    as used by Shibboleth:
    
    Chris Ries discovered that decoding a crafted URL leads to a crash (and
    potentially, arbitrary code execution).
    
    Ian Young discovered that embedded NUL characters in certificate names
    were not correctly handled, exposing configurations using PKIX trust
    validation to impersonation attacks.
    
    Incorrect processing of SAML metadata ignores key usage constraints.
    This minor issue also needs a correction in the opensaml2 packages,
    which will be provided in an upcoming stable point release (and,
    before that, via stable-proposed-updates).
    
    For the stable distribution (lenny), these problems have been fixed in
    version 1.0-2+lenny1.
    
    For the unstable distribution (sid), these problems have been fixed in
    version 1.2.2-1.
    
    We recommend that you upgrade your xmltooling packages.
    
    Upgrade instructions
    - --------------------
    
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    
    If you are using the apt-get package manager, use the line for
    sources.list as given below:
    
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    
    
    Debian GNU/Linux 5.0 alias lenny
    - --------------------------------
    
    Source archives:
    
      http://security.debian.org/pool/updates/main/x/xmltooling/xmltooling_1.0-2+lenny1.dsc
        Size/MD5 checksum:     1457 b7a3967d272765308809a5c8d27595ed
      http://security.debian.org/pool/updates/main/x/xmltooling/xmltooling_1.0-2+lenny1.diff.gz
        Size/MD5 checksum:     8943 1317858121f3042e5cfb8367319b1c78
      http://security.debian.org/pool/updates/main/x/xmltooling/xmltooling_1.0.orig.tar.gz
        Size/MD5 checksum:   549767 4e7c21608f0fbdcfd966263f0c350d99
    
    Architecture independent packages:
    
      http://security.debian.org/pool/updates/main/x/xmltooling/xmltooling-schemas_1.0-2+lenny1_all.deb
        Size/MD5 checksum:    11910 395d8f3a32e0c75da52a27c76f05c76f
      http://security.debian.org/pool/updates/main/x/xmltooling/libxmltooling-doc_1.0-2+lenny1_all.deb
        Size/MD5 checksum:   938774 bc039db5a32dd02df34bf8b5146c551e
    
    alpha architecture (DEC Alpha)
    
      http://security.debian.org/pool/updates/main/x/xmltooling/libxmltooling-dev_1.0-2+lenny1_alpha.deb
        Size/MD5 checksum:    75002 bb6a2bebec1586b842d663a55429ebb0
      http://security.debian.org/pool/updates/main/x/xmltooling/libxmltooling1_1.0-2+lenny1_alpha.deb
        Size/MD5 checksum:   799538 9cdc74e48b5fd67f300715096adf15a7
    
    amd64 architecture (AMD x86_64 (AMD64))
    
      http://security.debian.org/pool/updates/main/x/xmltooling/libxmltooling1_1.0-2+lenny1_amd64.deb
        Size/MD5 checksum:   736934 2e220b0edab912f586af6c3d2538f409
      http://security.debian.org/pool/updates/main/x/xmltooling/libxmltooling-dev_1.0-2+lenny1_amd64.deb
        Size/MD5 checksum:    75792 3cc7822c1c88f61130fcf0d03d6e4311
    
    arm architecture (ARM)
    
      http://security.debian.org/pool/updates/main/x/xmltooling/libxmltooling1_1.0-2+lenny1_arm.deb
        Size/MD5 checksum:   750312 20cd9cd8bb91f2a9755e503e538a550c
      http://security.debian.org/pool/updates/main/x/xmltooling/libxmltooling-dev_1.0-2+lenny1_arm.deb
        Size/MD5 checksum:    75082 3fbb6e674b1b729be300d6255a2729f3
    
    armel architecture (ARM EABI)
    
      http://security.debian.org/pool/updates/main/x/xmltooling/libxmltooling1_1.0-2+lenny1_armel.deb
        Size/MD5 checksum:   637366 2190e5db31659ca5c58835341f1eb6ce
      http://security.debian.org/pool/updates/main/x/xmltooling/libxmltooling-dev_1.0-2+lenny1_armel.deb
        Size/MD5 checksum:    74554 2638c933e772f9ab2e9720f1b0436935
    
    hppa architecture (HP PA RISC)
    
      http://security.debian.org/pool/updates/main/x/xmltooling/libxmltooling1_1.0-2+lenny1_hppa.deb
        Size/MD5 checksum:   850440 a4e865bd4774c483559c99df549a3bfa
      http://security.debian.org/pool/updates/main/x/xmltooling/libxmltooling-dev_1.0-2+lenny1_hppa.deb
        Size/MD5 checksum:    75102 7546f61b1564b4c5c49ad69c71c7d223
    
    i386 architecture (Intel ia32)
    
      http://security.debian.org/pool/updates/main/x/xmltooling/libxmltooling-dev_1.0-2+lenny1_i386.deb
        Size/MD5 checksum:    74980 836fc866e7446cf594281eda1602c81f
      http://security.debian.org/pool/updates/main/x/xmltooling/libxmltooling1_1.0-2+lenny1_i386.deb
        Size/MD5 checksum:   683958 4556a60904d3c09d735301cbadd463f4
    
    ia64 architecture (Intel ia64)
    
      http://security.debian.org/pool/updates/main/x/xmltooling/libxmltooling-dev_1.0-2+lenny1_ia64.deb
        Size/MD5 checksum:    74052 7168ee5c68b5d5e41ac996e3b98ba2b8
      http://security.debian.org/pool/updates/main/x/xmltooling/libxmltooling1_1.0-2+lenny1_ia64.deb
        Size/MD5 checksum:   938056 b550972c349c99aa5b11473868531a4a
    
    mips architecture (MIPS (Big Endian))
    
      http://security.debian.org/pool/updates/main/x/xmltooling/libxmltooling1_1.0-2+lenny1_mips.deb
        Size/MD5 checksum:   697412 189506c8bd9473f11e09275f613c2e61
      http://security.debian.org/pool/updates/main/x/xmltooling/libxmltooling-dev_1.0-2+lenny1_mips.deb
        Size/MD5 checksum:    74992 933d28c7a0bb457488bcf37442f999ef
    
    mipsel architecture (MIPS (Little Endian))
    
      http://security.debian.org/pool/updates/main/x/xmltooling/libxmltooling1_1.0-2+lenny1_mipsel.deb
        Size/MD5 checksum:   663610 8105a8478fe3d8a0724745c0597893e8
      http://security.debian.org/pool/updates/main/x/xmltooling/libxmltooling-dev_1.0-2+lenny1_mipsel.deb
        Size/MD5 checksum:    74064 e8700e64464a0cf15a5ef070b759a84c
    
    powerpc architecture (PowerPC)
    
      http://security.debian.org/pool/updates/main/x/xmltooling/libxmltooling-dev_1.0-2+lenny1_powerpc.deb
        Size/MD5 checksum:    74072 e6444eda8c40348c9fa6025c770bf01e
      http://security.debian.org/pool/updates/main/x/xmltooling/libxmltooling1_1.0-2+lenny1_powerpc.deb
        Size/MD5 checksum:   777756 2e226da34bd88e91d5615704267d9e35
    
    s390 architecture (IBM S/390)
    
      http://security.debian.org/pool/updates/main/x/xmltooling/libxmltooling-dev_1.0-2+lenny1_s390.deb
        Size/MD5 checksum:    74040 7340da0a7d36d8c6029e8b40a75cef2b
      http://security.debian.org/pool/updates/main/x/xmltooling/libxmltooling1_1.0-2+lenny1_s390.deb
        Size/MD5 checksum:   745620 0a66b47c6a055692b2467502c1158a2e
    
    sparc architecture (Sun SPARC/UltraSPARC)
    
      http://security.debian.org/pool/updates/main/x/xmltooling/libxmltooling-dev_1.0-2+lenny1_sparc.deb
        Size/MD5 checksum:    74060 4ad661aacce58a25ea2491489d23a242
      http://security.debian.org/pool/updates/main/x/xmltooling/libxmltooling1_1.0-2+lenny1_sparc.deb
        Size/MD5 checksum:   828332 eb2255da533a6bdf3876afdb11c8ca73
    
    
      These files will probably be moved into the stable distribution on
      its next update.
    
    - ---------------------------------------------------------------------------------
    For apt-get: deb http://security.debian.org/ stable/updates main
    For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    Package info: `apt-cache show ' and http://packages.debian.org/
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"7","type":"x","order":"1","pct":58.33,"resources":[]},{"id":"88","title":"Should be more technical","votes":"3","type":"x","order":"2","pct":25,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"2","type":"x","order":"3","pct":16.67,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.