Debian: DSA-2045-1: New libtheora packages fix arbitrary code execution

    Date11 May 2010
    CategoryDebian
    36
    Posted ByLinuxSecurity Advisories
    Bob Clary, Dan Kaminsky and David Keeler discovered that in libtheora, a video library part of the Ogg project, several flaws allow allow context-dependent attackers via a large and specially crafted media file, to cause a denial of service (crash of the player using this
    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA1
    
    - ------------------------------------------------------------------------
    Debian Security Advisory DSA-2045-1                  This email address is being protected from spambots. You need JavaScript enabled to view it.
    http://www.debian.org/security/                       Sébastien Delafond
    May 11, 2010                          http://www.debian.org/security/faq
    - ------------------------------------------------------------------------
    
    Package        : libtheora
    Vulnerability  : integer overflow
    Problem type   : remote (local)
    Debian-specific: no
    CVE Id         : CVE-2009-3389
    Debian Bug     : 572950
    
    Bob Clary, Dan Kaminsky and David Keeler discovered that in libtheora, a
    video library part of the Ogg project, several flaws allow allow 
    context-dependent attackers via a large and specially crafted media
    file, to cause a denial of service (crash of the player using this
    library), and possibly arbitrary code execution.
    
    For the stable distribution (lenny), this problem has been fixed in
    version 1.0~beta3-1+lenny1.
    
    For the testing distribution (squeeze), this problem has been fixed in
    version 1.1.0-1.
    
    For the testing distribution (sid), this problem has been fixed in
    version 1.1.0-1.
    
    We recommend that you upgrade your libtheora packages.
    
    Upgrade instructions
    - --------------------
    
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    
    If you are using the apt-get package manager, use the line for
    sources.list as given below:
    
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    
    
    Debian GNU/Linux 5.0 alias lenny
    - --------------------------------
    
    Stable updates are available for alpha, amd64, arm, armel, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.
    
    Source archives:
    
      http://security.debian.org/pool/updates/main/libt/libtheora/libtheora_1.0~beta3-1+lenny1.diff.gz
        Size/MD5 checksum:     9211 4adde5563c493eb45e1db52ceda77873
      http://security.debian.org/pool/updates/main/libt/libtheora/libtheora_1.0~beta3.orig.tar.gz
        Size/MD5 checksum:  1891923 8bdc4b8586b78ddd19afd7eec90dbaf0
      http://security.debian.org/pool/updates/main/libt/libtheora/libtheora_1.0~beta3-1+lenny1.dsc
        Size/MD5 checksum:     1419 0495edbda8fc19ba77366666b52b3f96
    
    alpha architecture (DEC Alpha)
    
      http://security.debian.org/pool/updates/main/libt/libtheora/libtheora0_1.0~beta3-1+lenny1_alpha.deb
        Size/MD5 checksum:   403190 629276252bf18d631224d55be765e6c8
      http://security.debian.org/pool/updates/main/libt/libtheora/libtheora-dev_1.0~beta3-1+lenny1_alpha.deb
        Size/MD5 checksum:   421266 bccc2e6181230946a28e3246c387017d
      http://security.debian.org/pool/updates/main/libt/libtheora/libtheora-bin_1.0~beta3-1+lenny1_alpha.deb
        Size/MD5 checksum:    50136 413811f42c67ed9e1ea13e3ea0956320
    
    amd64 architecture (AMD x86_64 (AMD64))
    
      http://security.debian.org/pool/updates/main/libt/libtheora/libtheora-dev_1.0~beta3-1+lenny1_amd64.deb
        Size/MD5 checksum:   362178 b4561c12c916ea3f35c6503ec038c149
      http://security.debian.org/pool/updates/main/libt/libtheora/libtheora0_1.0~beta3-1+lenny1_amd64.deb
        Size/MD5 checksum:   289846 db3d1d0591544d5e706ec3a52864a6a8
      http://security.debian.org/pool/updates/main/libt/libtheora/libtheora-bin_1.0~beta3-1+lenny1_amd64.deb
        Size/MD5 checksum:    44034 d36e328b3ebd575a3050c50485a89309
    
    arm architecture (ARM)
    
      http://security.debian.org/pool/updates/main/libt/libtheora/libtheora-dev_1.0~beta3-1+lenny1_arm.deb
        Size/MD5 checksum:   360750 f6b0fb09ea0623205fc28f5de75bd353
      http://security.debian.org/pool/updates/main/libt/libtheora/libtheora-bin_1.0~beta3-1+lenny1_arm.deb
        Size/MD5 checksum:    44394 f7f8733b8ff1b70f70342997c2977fc6
      http://security.debian.org/pool/updates/main/libt/libtheora/libtheora0_1.0~beta3-1+lenny1_arm.deb
        Size/MD5 checksum:   296862 58999f750e8f8b27505fc05ae8d44cfd
    
    armel architecture (ARM EABI)
    
      http://security.debian.org/pool/updates/main/libt/libtheora/libtheora-dev_1.0~beta3-1+lenny1_armel.deb
        Size/MD5 checksum:   360340 ba1692b1e4846130f8f829b3d35a84ad
      http://security.debian.org/pool/updates/main/libt/libtheora/libtheora0_1.0~beta3-1+lenny1_armel.deb
        Size/MD5 checksum:   293820 8b28eedfba4772c199c818afcbd6d37a
      http://security.debian.org/pool/updates/main/libt/libtheora/libtheora-bin_1.0~beta3-1+lenny1_armel.deb
        Size/MD5 checksum:    50362 749321e42cb3c9f07331372f7631c50e
    
    hppa architecture (HP PA RISC)
    
      http://security.debian.org/pool/updates/main/libt/libtheora/libtheora0_1.0~beta3-1+lenny1_hppa.deb
        Size/MD5 checksum:   344588 0cad5cb5d1bb329f796e35a1ecb9a8d1
      http://security.debian.org/pool/updates/main/libt/libtheora/libtheora-dev_1.0~beta3-1+lenny1_hppa.deb
        Size/MD5 checksum:   378716 897254b9195f164aa4ee8d1eb7d3a53f
      http://security.debian.org/pool/updates/main/libt/libtheora/libtheora-bin_1.0~beta3-1+lenny1_hppa.deb
        Size/MD5 checksum:    49482 ebb455b75ba4aa01dc320fcb17f1c9ad
    
    i386 architecture (Intel ia32)
    
      http://security.debian.org/pool/updates/main/libt/libtheora/libtheora-dev_1.0~beta3-1+lenny1_i386.deb
        Size/MD5 checksum:   335386 05fe606ecc411f6b3fe37423d74c8623
      http://security.debian.org/pool/updates/main/libt/libtheora/libtheora-bin_1.0~beta3-1+lenny1_i386.deb
        Size/MD5 checksum:    41506 8911aa359d16fc2a2680995100e85a7d
      http://security.debian.org/pool/updates/main/libt/libtheora/libtheora0_1.0~beta3-1+lenny1_i386.deb
        Size/MD5 checksum:   275724 2559a2649e90a42a727ea69d4198370f
    
    ia64 architecture (Intel ia64)
    
      http://security.debian.org/pool/updates/main/libt/libtheora/libtheora0_1.0~beta3-1+lenny1_ia64.deb
        Size/MD5 checksum:   538602 c197380aca5abef9da5a643ea73b3b1e
      http://security.debian.org/pool/updates/main/libt/libtheora/libtheora-bin_1.0~beta3-1+lenny1_ia64.deb
        Size/MD5 checksum:    65004 60f01930234153b1e1fdd5be3042d50c
      http://security.debian.org/pool/updates/main/libt/libtheora/libtheora-dev_1.0~beta3-1+lenny1_ia64.deb
        Size/MD5 checksum:   478596 c93589ae67d483b4a7402142f9e68e74
    
    mips architecture (MIPS (Big Endian))
    
      http://security.debian.org/pool/updates/main/libt/libtheora/libtheora0_1.0~beta3-1+lenny1_mips.deb
        Size/MD5 checksum:   345788 9107086573ff1ccb433a70fc69174cb8
      http://security.debian.org/pool/updates/main/libt/libtheora/libtheora-bin_1.0~beta3-1+lenny1_mips.deb
        Size/MD5 checksum:    49674 0badca1bacc739b84fcbdb482b54fb28
      http://security.debian.org/pool/updates/main/libt/libtheora/libtheora-dev_1.0~beta3-1+lenny1_mips.deb
        Size/MD5 checksum:   392358 df278772e719aa802f6b6659d14cae03
    
    powerpc architecture (PowerPC)
    
      http://security.debian.org/pool/updates/main/libt/libtheora/libtheora0_1.0~beta3-1+lenny1_powerpc.deb
        Size/MD5 checksum:   329800 4525279b78a4112dc72b35be1b0246c5
      http://security.debian.org/pool/updates/main/libt/libtheora/libtheora-bin_1.0~beta3-1+lenny1_powerpc.deb
        Size/MD5 checksum:    58448 1e5e67e6a78ac90c46d6efd12c09aa49
      http://security.debian.org/pool/updates/main/libt/libtheora/libtheora-dev_1.0~beta3-1+lenny1_powerpc.deb
        Size/MD5 checksum:   372872 c937a425cd74a00d3a4560b231ad0162
    
    s390 architecture (IBM S/390)
    
      http://security.debian.org/pool/updates/main/libt/libtheora/libtheora-bin_1.0~beta3-1+lenny1_s390.deb
        Size/MD5 checksum:    47504 9c8033b3f24e93085cb21451c67d7db0
      http://security.debian.org/pool/updates/main/libt/libtheora/libtheora0_1.0~beta3-1+lenny1_s390.deb
        Size/MD5 checksum:   306190 f8973e2551f272b54fa135a05cc68da2
      http://security.debian.org/pool/updates/main/libt/libtheora/libtheora-dev_1.0~beta3-1+lenny1_s390.deb
        Size/MD5 checksum:   348142 ecccb547f646e9fb284917b00f8b04db
    
    sparc architecture (Sun SPARC/UltraSPARC)
    
      http://security.debian.org/pool/updates/main/libt/libtheora/libtheora-bin_1.0~beta3-1+lenny1_sparc.deb
        Size/MD5 checksum:    43880 3caff6efac20f4bbc832ad35ef05c788
      http://security.debian.org/pool/updates/main/libt/libtheora/libtheora-dev_1.0~beta3-1+lenny1_sparc.deb
        Size/MD5 checksum:   344678 70334aeaa751f5f08dedc1e87804fed8
      http://security.debian.org/pool/updates/main/libt/libtheora/libtheora0_1.0~beta3-1+lenny1_sparc.deb
        Size/MD5 checksum:   270610 df122fae100726a66dee59845b8ce32d
    
    
      These files will probably be moved into the stable distribution on
      its next update.
    
    - ---------------------------------------------------------------------------------
    For apt-get: deb http://security.debian.org/ stable/updates main
    For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    Package info: `apt-cache show ' and http://packages.debian.org/
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"25","type":"x","order":"1","pct":54.35,"resources":[]},{"id":"88","title":"Should be more technical","votes":"5","type":"x","order":"2","pct":10.87,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"16","type":"x","order":"3","pct":34.78,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.