Debian: New libast packages fix arbitrary code execution

    Date15 Feb 2006
    CategoryDebian
    4501
    Posted ByLinuxSecurity Advisories
    Johnny Mast discovered a buffer overflow in libast, the library of assorted spiffy things, that can lead to the execution of arbitary code. This library is used by eterm which is installed setgid uid which leads to a vulnerability to alter the utmp file.
    - --------------------------------------------------------------------------
    Debian Security Advisory DSA 976-1                     This email address is being protected from spambots. You need JavaScript enabled to view it.
    http://www.debian.org/security/                             Martin Schulze
    February 15th, 2006                     http://www.debian.org/security/faq
    - --------------------------------------------------------------------------
    
    Package        : libast, libast1
    Vulnerability  : buffer overflow
    Problem type   : local
    Debian-specific: no
    CVE ID         : CVE-2006-0224
    
    Johnny Mast discovered a buffer overflow in libast, the library of
    assorted spiffy things, that can lead to the execution of arbitary
    code.  This library is used by eterm which is installed setgid uid
    which leads to a vulnerability to alter the utmp file.
    
    For the old stable distribution (woody) this problem has been fixed in
    version 0.4-3woody2.
    
    For the stable distribution (sarge) this problem has been fixed in
    version 0.6-0pre2003010606sarge1.
    
    For the unstable distribution (sid) this problem will be fixed soon.
    
    We recommend that you upgrade your libast packages.
    
    
    Upgrade Instructions
    - --------------------
    
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    
    If you are using the apt-get package manager, use the line for
    sources.list as given below:
    
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    
    
    Debian GNU/Linux 3.0 alias woody
    - --------------------------------
    
      Source archives:
    
        http://security.debian.org/pool/updates/main/liba/libast1/libast1_0.4-3woody2.dsc
          Size/MD5 checksum:      611 7ae117d391242963294499b684e783b6
        http://security.debian.org/pool/updates/main/liba/libast1/libast1_0.4-3woody2.diff.gz
          Size/MD5 checksum:   127092 fd7f99bde6a540fe50c27761b63e27cf
        http://security.debian.org/pool/updates/main/liba/libast1/libast1_0.4.orig.tar.gz
          Size/MD5 checksum:   150283 9424286314c1d816699b28964b91d015
    
      Alpha architecture:
    
        http://security.debian.org/pool/updates/main/liba/libast1/libast1_0.4-3woody2_alpha.deb
          Size/MD5 checksum:    30314 549273ceedb6d3836361ec4308df13b7
        http://security.debian.org/pool/updates/main/liba/libast1/libast1-dev_0.4-3woody2_alpha.deb
          Size/MD5 checksum:    46418 324e44548cf1c1ae9befb810f3ebc3cc
    
      ARM architecture:
    
        http://security.debian.org/pool/updates/main/liba/libast1/libast1_0.4-3woody2_arm.deb
          Size/MD5 checksum:    28496 702865048ba5822eef10de3cd9007819
        http://security.debian.org/pool/updates/main/liba/libast1/libast1-dev_0.4-3woody2_arm.deb
          Size/MD5 checksum:    37076 e454fa52adb41c91c0e9b806caf1418c
    
      Intel IA-32 architecture:
    
        http://security.debian.org/pool/updates/main/liba/libast1/libast1_0.4-3woody2_i386.deb
          Size/MD5 checksum:    24804 cb4f324b197dad2f1069af530e1f7051
        http://security.debian.org/pool/updates/main/liba/libast1/libast1-dev_0.4-3woody2_i386.deb
          Size/MD5 checksum:    33096 2eae854498d4ee6a27badcf8603cab7e
    
      Intel IA-64 architecture:
    
        http://security.debian.org/pool/updates/main/liba/libast1/libast1_0.4-3woody2_ia64.deb
          Size/MD5 checksum:    37426 fab097ad84832a872a0af9f6b61a4db7
        http://security.debian.org/pool/updates/main/liba/libast1/libast1-dev_0.4-3woody2_ia64.deb
          Size/MD5 checksum:    47926 530f9e8878f21ee1f2dbcb0dbd16db7d
    
      HP Precision architecture:
    
        http://security.debian.org/pool/updates/main/liba/libast1/libast1_0.4-3woody2_hppa.deb
          Size/MD5 checksum:    30870 9c9be1baeb94f828c281db145cac7e45
        http://security.debian.org/pool/updates/main/liba/libast1/libast1-dev_0.4-3woody2_hppa.deb
          Size/MD5 checksum:    45820 e782f8f5846a48d7eb8a2791c61255e8
    
      Motorola 680x0 architecture:
    
        http://security.debian.org/pool/updates/main/liba/libast1/libast1_0.4-3woody2_m68k.deb
          Size/MD5 checksum:    25178 4293a0569fb9f3266e8644e332c1f2bf
        http://security.debian.org/pool/updates/main/liba/libast1/libast1-dev_0.4-3woody2_m68k.deb
          Size/MD5 checksum:    32990 b78f08fede449151bde20f5b4ee82ea2
    
      Big endian MIPS architecture:
    
        http://security.debian.org/pool/updates/main/liba/libast1/libast1_0.4-3woody2_mips.deb
          Size/MD5 checksum:    24826 ccdf8838e4a6c7c7ecc29916d76af616
        http://security.debian.org/pool/updates/main/liba/libast1/libast1-dev_0.4-3woody2_mips.deb
          Size/MD5 checksum:    40754 9ea070dc4626dadb799bd45eeb27269b
    
      Little endian MIPS architecture:
    
        http://security.debian.org/pool/updates/main/liba/libast1/libast1_0.4-3woody2_mipsel.deb
          Size/MD5 checksum:    24932 2b5ff0209b86917d9e31ca111e57dffb
        http://security.debian.org/pool/updates/main/liba/libast1/libast1-dev_0.4-3woody2_mipsel.deb
          Size/MD5 checksum:    40440 ec95a2b1e72608b7deb882df9b7d7eef
    
      PowerPC architecture:
    
        http://security.debian.org/pool/updates/main/liba/libast1/libast1_0.4-3woody2_powerpc.deb
          Size/MD5 checksum:    28186 ec060589a8ac75ebb4da6cf071698503
        http://security.debian.org/pool/updates/main/liba/libast1/libast1-dev_0.4-3woody2_powerpc.deb
          Size/MD5 checksum:    41774 9ebee23c3319be0192868528f3f82c36
    
      IBM S/390 architecture:
    
        http://security.debian.org/pool/updates/main/liba/libast1/libast1_0.4-3woody2_s390.deb
          Size/MD5 checksum:    27124 f7a1cd1dff3d333919825565958c36d1
        http://security.debian.org/pool/updates/main/liba/libast1/libast1-dev_0.4-3woody2_s390.deb
          Size/MD5 checksum:    33494 48314490169bae367f5e93dedc58b6a0
    
      Sun Sparc architecture:
    
        http://security.debian.org/pool/updates/main/liba/libast1/libast1_0.4-3woody2_sparc.deb
          Size/MD5 checksum:    30330 c620f4c7d89db5f750a1ba792d8f5f95
        http://security.debian.org/pool/updates/main/liba/libast1/libast1-dev_0.4-3woody2_sparc.deb
          Size/MD5 checksum:    38862 50c09ef80e55176619c4b65ea0191bc2
    
    
    Debian GNU/Linux 3.1 alias sarge
    - --------------------------------
    
      Source archives:
    
        http://security.debian.org/pool/updates/main/liba/libast/libast_0.6-0pre2003010606sarge1.dsc
          Size/MD5 checksum:      576 9420ee95768da2f860552aac0b32b5e6
        http://security.debian.org/pool/updates/main/liba/libast/libast_0.6-0pre2003010606sarge1.tar.gz
          Size/MD5 checksum:   390719 52a0ee946d87bdf807d0a18b71bbf5e2
    
      Alpha architecture:
    
        http://security.debian.org/pool/updates/main/liba/libast/libast2_0.6-0pre2003010606sarge1_alpha.deb
          Size/MD5 checksum:    67308 524177839f05a53e16da08d221cf4270
        http://security.debian.org/pool/updates/main/liba/libast/libast2-dev_0.6-0pre2003010606sarge1_alpha.deb
          Size/MD5 checksum:   127226 6dad9a361f0ec9550bfb06325f6eca9b
    
      AMD64 architecture:
    
        http://security.debian.org/pool/updates/main/liba/libast/libast2_0.6-0pre2003010606sarge1_amd64.deb
          Size/MD5 checksum:    63212 5274afc640d0abb29f71c8445506aa6c
        http://security.debian.org/pool/updates/main/liba/libast/libast2-dev_0.6-0pre2003010606sarge1_amd64.deb
          Size/MD5 checksum:    94440 43c04d451f85e18b68be0fc83d62fdd9
    
      ARM architecture:
    
        http://security.debian.org/pool/updates/main/liba/libast/libast2_0.6-0pre2003010606sarge1_arm.deb
          Size/MD5 checksum:    55832 4987f49c1ed5d819cb91386474216675
        http://security.debian.org/pool/updates/main/liba/libast/libast2-dev_0.6-0pre2003010606sarge1_arm.deb
          Size/MD5 checksum:    90590 09e5736d3ae6ba985dcc86607536aad3
    
      Intel IA-32 architecture:
    
        http://security.debian.org/pool/updates/main/liba/libast/libast2_0.6-0pre2003010606sarge1_i386.deb
          Size/MD5 checksum:    56184 3baf39df1af7fb0370f1487d97fa328d
        http://security.debian.org/pool/updates/main/liba/libast/libast2-dev_0.6-0pre2003010606sarge1_i386.deb
          Size/MD5 checksum:    84908 26f77c7997a59f621d3ec32a563fd0f4
    
      Intel IA-64 architecture:
    
        http://security.debian.org/pool/updates/main/liba/libast/libast2_0.6-0pre2003010606sarge1_ia64.deb
          Size/MD5 checksum:    77708 744fe6d6a70465912b66f42e7ab0f650
        http://security.debian.org/pool/updates/main/liba/libast/libast2-dev_0.6-0pre2003010606sarge1_ia64.deb
          Size/MD5 checksum:   123406 7e47159f62b98acce66f18aa1fb3059a
    
      HP Precision architecture:
    
        http://security.debian.org/pool/updates/main/liba/libast/libast2_0.6-0pre2003010606sarge1_hppa.deb
          Size/MD5 checksum:    65842 3a61b0d8cfb2b93da56bca7695ab34c5
        http://security.debian.org/pool/updates/main/liba/libast/libast2-dev_0.6-0pre2003010606sarge1_hppa.deb
          Size/MD5 checksum:   104328 da13a39f4f86b7b06f18e143e6697a9b
    
      Motorola 680x0 architecture:
    
        http://security.debian.org/pool/updates/main/liba/libast/libast2_0.6-0pre2003010606sarge1_m68k.deb
          Size/MD5 checksum:    54526 df42f2ef3b882894e5d7062474a03f7a
        http://security.debian.org/pool/updates/main/liba/libast/libast2-dev_0.6-0pre2003010606sarge1_m68k.deb
          Size/MD5 checksum:    80642 4f3f46861e8cf01acfa83c5cb99761e6
    
      Big endian MIPS architecture:
    
        http://security.debian.org/pool/updates/main/liba/libast/libast2_0.6-0pre2003010606sarge1_mips.deb
          Size/MD5 checksum:    55404 0fe139bd8d3ab4082b0368418158e5cf
        http://security.debian.org/pool/updates/main/liba/libast/libast2-dev_0.6-0pre2003010606sarge1_mips.deb
          Size/MD5 checksum:   100148 842ed436fd72d2763551d0b5c727f6f0
    
      Little endian MIPS architecture:
    
        http://security.debian.org/pool/updates/main/liba/libast/libast2_0.6-0pre2003010606sarge1_mipsel.deb
          Size/MD5 checksum:    55708 e6fef4a2764657e3a6c5379ad4ca734b
        http://security.debian.org/pool/updates/main/liba/libast/libast2-dev_0.6-0pre2003010606sarge1_mipsel.deb
          Size/MD5 checksum:    99892 8006e1709f1170b4cb68f12029abf246
    
      PowerPC architecture:
    
        http://security.debian.org/pool/updates/main/liba/libast/libast2_0.6-0pre2003010606sarge1_powerpc.deb
          Size/MD5 checksum:    58540 51c6c2e4c1e31f127995e5b2305f0e4b
        http://security.debian.org/pool/updates/main/liba/libast/libast2-dev_0.6-0pre2003010606sarge1_powerpc.deb
          Size/MD5 checksum:    98048 fabbf05a9a0d89b311cfc6153d807fcc
    
      IBM S/390 architecture:
    
        http://security.debian.org/pool/updates/main/liba/libast/libast2_0.6-0pre2003010606sarge1_s390.deb
          Size/MD5 checksum:    63928 78518a64a55be0d18f82ec1610e756dc
        http://security.debian.org/pool/updates/main/liba/libast/libast2-dev_0.6-0pre2003010606sarge1_s390.deb
          Size/MD5 checksum:    90818 0c68ab4af0d61a5a5e5cce80827c81ca
    
      Sun Sparc architecture:
    
        http://security.debian.org/pool/updates/main/liba/libast/libast2_0.6-0pre2003010606sarge1_sparc.deb
          Size/MD5 checksum:    57060 8efa5b2512f3a5e209c7b5512d129479
        http://security.debian.org/pool/updates/main/liba/libast/libast2-dev_0.6-0pre2003010606sarge1_sparc.deb
          Size/MD5 checksum:    91510 abb85b30007dbe82c7a20b4040d4e7aa
    
    
      These files will probably be moved into the stable distribution on
      its next update.
    
    - ---------------------------------------------------------------------------------
    For apt-get: deb http://security.debian.org/ stable/updates main
    For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"23","type":"x","order":"1","pct":56.1,"resources":[]},{"id":"88","title":"Should be more technical","votes":"5","type":"x","order":"2","pct":12.2,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"13","type":"x","order":"3","pct":31.71,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.