Debian: DSA-2071-1: New libmikmod packages fix several vulnerabilities

    Date14 Jul 2010
    CategoryDebian
    36
    Posted ByLinuxSecurity Advisories
    Dyon Balding discovered buffer overflows in the MikMod sound library, which could lead to the execution of arbitrary code if a user is tricked into opening malformed Impulse Tracker or Ultratracker sound files.
    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA1
    
    - ------------------------------------------------------------------------
    Debian Security Advisory DSA-2071-1                  This email address is being protected from spambots. You need JavaScript enabled to view it.
    http://www.debian.org/security/                       Moritz Muehlenhoff
    July 14, 2010                         http://www.debian.org/security/faq
    - ------------------------------------------------------------------------
    
    Package        : libmikmod
    Vulnerability  : buffer overflows
    Problem type   : local(remote)
    Debian-specific: no
    CVE Id(s)      : CVE-2009-3995 CVE-2009-3996
    
    Dyon Balding discovered buffer overflows in the MikMod sound library, 
    which could lead to the execution of arbitrary code if a user is 
    tricked into opening malformed Impulse Tracker or Ultratracker sound 
    files.
    
    For the stable distribution (lenny), these problems have been fixed in
    version 3.1.11-6+lenny1.
    
    For the unstable distribution (sid), these problems have been fixed in
    version 3.1.11-6.2.
    
    We recommend that you upgrade your libmikmod packages.
    
    Upgrade instructions
    - --------------------
    
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    
    If you are using the apt-get package manager, use the line for
    sources.list as given below:
    
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    
    
    Debian GNU/Linux 5.0 alias lenny
    - --------------------------------
    
    Stable updates are available for alpha, amd64, arm, armel, hppa, i386, ia64, mips, mipsel, powerpc, s390 and sparc.
    
    Source archives:
    
      http://security.debian.org/pool/updates/main/libm/libmikmod/libmikmod_3.1.11-6+lenny1.dsc
        Size/MD5 checksum:     1038 9741350a41a54261dbf242f02aa325fd
      http://security.debian.org/pool/updates/main/libm/libmikmod/libmikmod_3.1.11.orig.tar.gz
        Size/MD5 checksum:   611590 705106da305e8de191549f1e7393185c
      http://security.debian.org/pool/updates/main/libm/libmikmod/libmikmod_3.1.11-6+lenny1.diff.gz
        Size/MD5 checksum:   336630 4e4d04d2c9b5bcdd3edb3b04e683ea86
    
    alpha architecture (DEC Alpha)
    
      http://security.debian.org/pool/updates/main/libm/libmikmod/libmikmod2_3.1.11-a-6+lenny1_alpha.deb
        Size/MD5 checksum:   221696 e01fb2f9c7e693ae7b0727a552da31a1
      http://security.debian.org/pool/updates/main/libm/libmikmod/libmikmod2-dev_3.1.11-a-6+lenny1_alpha.deb
        Size/MD5 checksum:   378570 dd8abb7da4195af53aed1e57750d2f1f
    
    amd64 architecture (AMD x86_64 (AMD64))
    
      http://security.debian.org/pool/updates/main/libm/libmikmod/libmikmod2_3.1.11-a-6+lenny1_amd64.deb
        Size/MD5 checksum:   157216 b3836423b8875f21d5ae01d5f9b533c5
      http://security.debian.org/pool/updates/main/libm/libmikmod/libmikmod2-dev_3.1.11-a-6+lenny1_amd64.deb
        Size/MD5 checksum:   265776 935b94d522dd814337b06acd07184fb7
    
    arm architecture (ARM)
    
      http://security.debian.org/pool/updates/main/libm/libmikmod/libmikmod2_3.1.11-a-6+lenny1_arm.deb
        Size/MD5 checksum:   164040 f2fdc8c7f4c7f54ec75ffd179c98ddca
      http://security.debian.org/pool/updates/main/libm/libmikmod/libmikmod2-dev_3.1.11-a-6+lenny1_arm.deb
        Size/MD5 checksum:   264064 2eba8b4037ca117fc8920563d2b05ca3
    
    armel architecture (ARM EABI)
    
      http://security.debian.org/pool/updates/main/libm/libmikmod/libmikmod2_3.1.11-a-6+lenny1_armel.deb
        Size/MD5 checksum:   155766 916c6a467219ed4a5e0da68168c1e591
      http://security.debian.org/pool/updates/main/libm/libmikmod/libmikmod2-dev_3.1.11-a-6+lenny1_armel.deb
        Size/MD5 checksum:   254664 77c56898614f92c30e0ad5ef2de7c0cc
    
    hppa architecture (HP PA RISC)
    
      http://security.debian.org/pool/updates/main/libm/libmikmod/libmikmod2_3.1.11-a-6+lenny1_hppa.deb
        Size/MD5 checksum:   185910 6b044e5ce0fb2de4fc37a8ddbbd037a0
      http://security.debian.org/pool/updates/main/libm/libmikmod/libmikmod2-dev_3.1.11-a-6+lenny1_hppa.deb
        Size/MD5 checksum:   299236 40db7231bf6258319f45412c1d46df50
    
    i386 architecture (Intel ia32)
    
      http://security.debian.org/pool/updates/main/libm/libmikmod/libmikmod2-dev_3.1.11-a-6+lenny1_i386.deb
        Size/MD5 checksum:   244570 c4363c834307008b053bb1899a13013f
      http://security.debian.org/pool/updates/main/libm/libmikmod/libmikmod2_3.1.11-a-6+lenny1_i386.deb
        Size/MD5 checksum:   147266 3d8adb8a243afb7a614052ba7494e01e
    
    ia64 architecture (Intel ia64)
    
      http://security.debian.org/pool/updates/main/libm/libmikmod/libmikmod2_3.1.11-a-6+lenny1_ia64.deb
        Size/MD5 checksum:   264426 c2d6c1a0d1b32ff27030ec2f1cd3ebe4
      http://security.debian.org/pool/updates/main/libm/libmikmod/libmikmod2-dev_3.1.11-a-6+lenny1_ia64.deb
        Size/MD5 checksum:   391590 39c904baed7a4462ccbf10805cae88c0
    
    mips architecture (MIPS (Big Endian))
    
      http://security.debian.org/pool/updates/main/libm/libmikmod/libmikmod2_3.1.11-a-6+lenny1_mips.deb
        Size/MD5 checksum:   167728 708a04685879d374730d4b94dd87a7d8
      http://security.debian.org/pool/updates/main/libm/libmikmod/libmikmod2-dev_3.1.11-a-6+lenny1_mips.deb
        Size/MD5 checksum:   292908 f52fce4500f59af99befc30fab46d48d
    
    mipsel architecture (MIPS (Little Endian))
    
      http://security.debian.org/pool/updates/main/libm/libmikmod/libmikmod2-dev_3.1.11-a-6+lenny1_mipsel.deb
        Size/MD5 checksum:   291132 c1c7fa74ce5a2d4e580aae5f5db21b8d
      http://security.debian.org/pool/updates/main/libm/libmikmod/libmikmod2_3.1.11-a-6+lenny1_mipsel.deb
        Size/MD5 checksum:   167172 65bd1438a4cac985a0dc555f9b0eb54f
    
    powerpc architecture (PowerPC)
    
      http://security.debian.org/pool/updates/main/libm/libmikmod/libmikmod2-dev_3.1.11-a-6+lenny1_powerpc.deb
        Size/MD5 checksum:   284010 0d98c66f1cbc9c34f87d1c9721fa7681
      http://security.debian.org/pool/updates/main/libm/libmikmod/libmikmod2_3.1.11-a-6+lenny1_powerpc.deb
        Size/MD5 checksum:   173082 a953d970966c47adc2d55d2c5959835b
    
    s390 architecture (IBM S/390)
    
      http://security.debian.org/pool/updates/main/libm/libmikmod/libmikmod2_3.1.11-a-6+lenny1_s390.deb
        Size/MD5 checksum:   172646 e10ca9b6552459194a6d6d46799103dd
      http://security.debian.org/pool/updates/main/libm/libmikmod/libmikmod2-dev_3.1.11-a-6+lenny1_s390.deb
        Size/MD5 checksum:   268534 98768623fa899a4e2835dfced3b90d10
    
    sparc architecture (Sun SPARC/UltraSPARC)
    
      http://security.debian.org/pool/updates/main/libm/libmikmod/libmikmod2_3.1.11-a-6+lenny1_sparc.deb
        Size/MD5 checksum:   150056 ed9837041b097d69e887eacce18917df
      http://security.debian.org/pool/updates/main/libm/libmikmod/libmikmod2-dev_3.1.11-a-6+lenny1_sparc.deb
        Size/MD5 checksum:   256132 bb7c09b265c54f42447199100d626c32
    
    
      These files will probably be moved into the stable distribution on
      its next update.
    
    - ---------------------------------------------------------------------------------
    For apt-get: deb http://security.debian.org/ stable/updates main
    For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    Package info: `apt-cache show ' and http://packages.debian.org/
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"65","type":"x","order":"1","pct":57.52,"resources":[]},{"id":"88","title":"Should be more technical","votes":"15","type":"x","order":"2","pct":13.27,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"33","type":"x","order":"3","pct":29.2,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.