Debian: New gnomemeeting packages fix arbitrary code execution

    Date04 Mar 2007
    CategoryDebian
    4419
    Posted ByLinuxSecurity Advisories
    Updated package.
    - --------------------------------------------------------------------------
    Debian Security Advisory DSA 1262-1                    This email address is being protected from spambots. You need JavaScript enabled to view it.
    http://www.debian.org/security/                         Moritz Muehlenhoff
    March 4th, 2007                         http://www.debian.org/security/faq
    - --------------------------------------------------------------------------
    
    Package        : gnomemeeting
    Vulnerability  : format string
    Problem-Type   : remote
    Debian-specific: no
    CVE ID         : CVE-2007-1007
    
    "Mu Security" discovered that a format string vulnerability in 
    the VoIP solution GnomeMeeting allows the execution of arbitrary code.
    
    For the stable distribution (sarge) this problem has been fixed in
    version 1.2.1-1sarge1.
    
    For the upcoming stable distribution (etch) this problem has been
    fixed in version 2.0.3-2.1 of the ekiga package.
    
    For the unstable distribution (sid) this problem has been fixed in
    version 2.0.3-2.1 of the ekiga package.
    
    We recommend that you upgrade your gnomemeeting package.
    
    
    Upgrade Instructions
    - --------------------
    
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    
    If you are using the apt-get package manager, use the line for
    sources.list as given below:
    
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    
    
    Debian GNU/Linux 3.1 alias sarge
    - --------------------------------
    
      Source archives:
    
        http://security.debian.org/pool/updates/main/g/gnomemeeting/gnomemeeting_1.2.1-1sarge1.dsc
          Size/MD5 checksum:     1746 e82643f764d6b43c521cca39a387e8f8
        http://security.debian.org/pool/updates/main/g/gnomemeeting/gnomemeeting_1.2.1-1sarge1.diff.gz
          Size/MD5 checksum:    22888 194f7471c22e1c81d5ab4325603e0cd1
        http://security.debian.org/pool/updates/main/g/gnomemeeting/gnomemeeting_1.2.1.orig.tar.gz
          Size/MD5 checksum:  5525398 93829f3eee783f32eaefebc9e717fb89
    
      Alpha architecture:
    
        http://security.debian.org/pool/updates/main/g/gnomemeeting/gnomemeeting_1.2.1-1sarge1_alpha.deb
          Size/MD5 checksum:  3146922 f500df544b335593a2bb9431cbd21592
    
      AMD64 architecture:
    
        http://security.debian.org/pool/updates/main/g/gnomemeeting/gnomemeeting_1.2.1-1sarge1_amd64.deb
          Size/MD5 checksum:  3119044 672fbec91d13256a46a8803486a03346
    
      ARM architecture:
    
        http://security.debian.org/pool/updates/main/g/gnomemeeting/gnomemeeting_1.2.1-1sarge1_arm.deb
          Size/MD5 checksum:  3089174 45beb5e78751eddbb13bd812b464cfb2
    
      HP Precision architecture:
    
        http://security.debian.org/pool/updates/main/g/gnomemeeting/gnomemeeting_1.2.1-1sarge1_hppa.deb
          Size/MD5 checksum:  3119086 7f92e053556ba684c120aa83c7a7c114
    
      Intel IA-32 architecture:
    
        http://security.debian.org/pool/updates/main/g/gnomemeeting/gnomemeeting_1.2.1-1sarge1_i386.deb
          Size/MD5 checksum:  3105396 4883efb8f1da3aa1641e249f50030f10
    
      Intel IA-64 architecture:
    
        http://security.debian.org/pool/updates/main/g/gnomemeeting/gnomemeeting_1.2.1-1sarge1_ia64.deb
          Size/MD5 checksum:  3192488 393b4321afb3e4077a3958d686fa02a1
    
      Motorola 680x0 architecture:
    
        http://security.debian.org/pool/updates/main/g/gnomemeeting/gnomemeeting_1.2.1-1sarge1_m68k.deb
          Size/MD5 checksum:  3080404 d9663a63d7077b2a0cd81722a44e53d0
    
      Big endian MIPS architecture:
    
        http://security.debian.org/pool/updates/main/g/gnomemeeting/gnomemeeting_1.2.1-1sarge1_mips.deb
          Size/MD5 checksum:  3131084 2c7367aabe62f5f9169fc81ea217c448
    
      Little endian MIPS architecture:
    
        http://security.debian.org/pool/updates/main/g/gnomemeeting/gnomemeeting_1.2.1-1sarge1_mipsel.deb
          Size/MD5 checksum:  3123832 ca06f5a2993f0b1ded5834ed1077e969
    
      PowerPC architecture:
    
        http://security.debian.org/pool/updates/main/g/gnomemeeting/gnomemeeting_1.2.1-1sarge1_powerpc.deb
          Size/MD5 checksum:  3103054 22b5b85dd549856800375f06cfc0dfa6
    
      IBM S/390 architecture:
    
        http://security.debian.org/pool/updates/main/g/gnomemeeting/gnomemeeting_1.2.1-1sarge1_s390.deb
          Size/MD5 checksum:  3110952 bcf48d4d889661c1659c1afcbeaa2d24
    
      Sun Sparc architecture:
    
        http://security.debian.org/pool/updates/main/g/gnomemeeting/gnomemeeting_1.2.1-1sarge1_sparc.deb
          Size/MD5 checksum:  3093420 1d6df4cf0981cf802be3d9b06075ec41
    
    
      These files will probably be moved into the stable distribution on
      its next update.
    
    - ---------------------------------------------------------------------------------
    For apt-get: deb http://security.debian.org/ stable/updates main
    For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"25","type":"x","order":"1","pct":54.35,"resources":[]},{"id":"88","title":"Should be more technical","votes":"5","type":"x","order":"2","pct":10.87,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"16","type":"x","order":"3","pct":34.78,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.