Debian: linpopup arbitrary code execution fix
Summary
--------------------------------------------------------------------------Debian Security Advisory DSA 632-1 security@debian.org http://www.debian.org/security/ Martin Schulze January 10th, 2005 http://www.debian.org/security/faq --------------------------------------------------------------------------Package : linpopup Vulnerability : buffer overflow Problem-Type : remote Debian-specific: no CVE ID : CAN-2004-1282 Debian Bug : 287044 Stephen Dranger discovered a buffer overflow in linpopup, an X11 port of winpopup, running over Samba, that could lead to the execution of arbitrary code when displaying a maliciously crafted message. For the stable distribution (woody) this problem has been fixed in version 1.2.0-2woody1. For the unstable distribution (sid) this problem has been fixed in version 1.2.0-7. We recommend that you upgrade your linpopup package. Upgrade Instructions --------------------wget url will fetch the file for you dpkg -i file.deb will install the referenced file. If you are using the apt-get package manager, use the line for sources.list as given below: apt-get update will update the internal database apt-get upgrade will install corrected packages You may use an automated update by adding the resources from the footer to the proper configuration. Debian GNU/Linux 3.0 alias woody -------------------------------- Source archives: Size/MD5 checksum: 577 b5272d2427beb92f9572337c3907f7bf Size/MD5 checksum: 14771 346c0d8fc894eb9660cbc945f53d7a48 Size/MD5 checksum: 145628 26503ac44971e334cbbb0a79dd796d93 Alpha architecture: Size/MD5 checksum: 84980 bd4cc7b95e42ae85891826fdd9345e5d ARM architecture: Size/MD5 checksum: 74870 b80b3706d1edb463b4d7ef0f56c87e79 Intel IA-32 architecture: Size/MD5 checksum: 74384 2f4379854819b565ccccd7b12a6c49de Intel IA-64 architecture: Size/MD5 checksum: 92484 04b4b1b3708af2b60c06e9f71f01713e HP Precision architecture: Size/MD5 checksum: 79440 7f77468ea23f65fc9a8ffdb8f46cdea9 Motorola 680x0 architecture: Size/MD5 checksum: 74278 d796fa11bf939e3fd5bcbe1f4e2a4d13 Big endian MIPS architecture: Size/MD5 checksum: 76782 55cfe5ccdd97d3cda45195adaf881149 Little endian MIPS architecture: Size/MD5 checksum: 75740 0437ce2cd5f7eac82c53d093d3705e3e PowerPC architecture: Size/MD5 checksum: 76628 141d3f2f5ea14033380407ba5f947f5e IBM S/390 architecture: Size/MD5 checksum: 76724 741b61e7ba6bbe691b717a7e426ed3e5 Sun Sparc architecture: Size/MD5 checksum: 76130 a316e43db286b9ae298481d0bbe6fd29 These files will probably be moved into the stable distribution on its next update. ---------------------------------------------------------------------------------For apt-get: deb http://security.debian.org/ stable/updates main For dpkg-ftp: dists/stable/updates/main Mailing list: debian-security-announce@lists.debian.org Package info: `apt-cache show' and http://packages.debian.org/