Debian: New mc packages fix several vulnerabilities

    Date14 Jan 2005
    CategoryDebian
    7005
    Posted ByJoe Shakespeare
    ndrew V. Samoilov has noticed that several bugfixes which were applied to the source by upstream developers of mc, the midnight commander, a file browser and manager, were not backported to the current version of mc that Debian ships in their stable release.
    
    - --------------------------------------------------------------------------
    Debian Security Advisory DSA 639-1                     This email address is being protected from spambots. You need JavaScript enabled to view it.
    http://www.debian.org/security/                             Martin Schulze
    January 14th, 2005                      http://www.debian.org/security/faq
    - --------------------------------------------------------------------------
    
    Package        : mc
    Vulnerability  : several
    Problem-Type   : remote
    Debian-specific: no
    CVE ID         : CAN-2004-1004 CAN-2004-1005 CAN-2004-1009 CAN-2004-1090 CAN-2004-1091 
                     CAN-2004-1092 CAN-2004-1093 CAN-2004-1174 CAN-2004-1175 CAN-2004-1176
    
    Andrew V. Samoilov has noticed that several bugfixes which were
    applied to the source by upstream developers of mc, the midnight
    commander, a file browser and manager, were not backported to the
    current version of mc that Debian ships in their stable release.  The
    Common Vulnerabilities and Exposures Project identifies the following
    vulnerabilities:
    
    CAN-2004-1004
    
        Multiple format string vulnerabilities
    
    CAN-2004-1005
    
        Multiple buffer overflows
    
    CAN-2004-1009
    
        One infinite loop vulnerability
    
    CAN-2004-1090
    
        Denial of service via  corrupted section header
    
    CAN-2004-1091
    
        Denial of service via null dereference
    
    CAN-2004-1092
    
        Freeing unallocated memory
    
    CAN-2004-1093
    
        Denial of service via use of already freed memory
    
    CAN-2004-1174
    
        Denial of service via manipulating non-existing file handles
    
    CAN-2004-1175
    
        Unintended program execution via insecure filename quoting
    
    CAN-2004-1176
    
        Denial of service via a buffer underflow
    
    For the stable distribution (woody) these problems have been fixed in
    version 4.5.55-1.2woody5
    
    For the unstable distribution (sid) these problems should already be
    fixed since they were backported from current versions.
    
    We recommend that you upgrade your mc package.
    
    
    Upgrade Instructions
    - --------------------
    
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    
    If you are using the apt-get package manager, use the line for
    sources.list as given below:
    
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    
    
    Debian GNU/Linux 3.0 alias woody
    - --------------------------------
    
      Source archives:
    
        http://security.debian.org/pool/updates/main/m/mc/mc_4.5.55-1.2woody5.dsc
          Size/MD5 checksum:      798 09408d39e539898d3384293454b806a8
        http://security.debian.org/pool/updates/main/m/mc/mc_4.5.55-1.2woody5.diff.gz
          Size/MD5 checksum:    51884 64d27d64149013cbbfcbe0d568f872af
        http://security.debian.org/pool/updates/main/m/mc/mc_4.5.55.orig.tar.gz
          Size/MD5 checksum:  4850321 82772e729bb2ecfe486a6c219ebab09f
    
      Alpha architecture:
    
        http://security.debian.org/pool/updates/main/m/mc/gmc_4.5.55-1.2woody5_alpha.deb
          Size/MD5 checksum:  1186490 28bce9bd85c73413c4e610a83f6c80dd
        http://security.debian.org/pool/updates/main/m/mc/mc_4.5.55-1.2woody5_alpha.deb
          Size/MD5 checksum:   562942 519466cca7aa730a64c5ff629fe64112
        http://security.debian.org/pool/updates/main/m/mc/mc-common_4.5.55-1.2woody5_alpha.deb
          Size/MD5 checksum:  1351654 7b7e2ee396427d08f38bb2610533fb25
    
      ARM architecture:
    
        http://security.debian.org/pool/updates/main/m/mc/gmc_4.5.55-1.2woody5_arm.deb
          Size/MD5 checksum:  1028206 7bc8143ab26f4c42ef99de8f86d30604
        http://security.debian.org/pool/updates/main/m/mc/mc_4.5.55-1.2woody5_arm.deb
          Size/MD5 checksum:   480562 94e93aaa4a2dccb4b3acde553091fce7
        http://security.debian.org/pool/updates/main/m/mc/mc-common_4.5.55-1.2woody5_arm.deb
          Size/MD5 checksum:  1351824 cd5a6b905f11fd1661a16e790bf1f588
    
      Intel IA-32 architecture:
    
        http://security.debian.org/pool/updates/main/m/mc/gmc_4.5.55-1.2woody5_i386.deb
          Size/MD5 checksum:   994986 0c53de4cf192308977e39bb4a7216314
        http://security.debian.org/pool/updates/main/m/mc/mc_4.5.55-1.2woody5_i386.deb
          Size/MD5 checksum:   455878 7a09ac156183bc9cee032d674e21587c
        http://security.debian.org/pool/updates/main/m/mc/mc-common_4.5.55-1.2woody5_i386.deb
          Size/MD5 checksum:  1351766 fe4f6d051f36930a1533ac7239d5759f
    
      Intel IA-64 architecture:
    
        http://security.debian.org/pool/updates/main/m/mc/gmc_4.5.55-1.2woody5_ia64.deb
          Size/MD5 checksum:  1435394 06eb2692e366aa35d3aa39f2903253a7
        http://security.debian.org/pool/updates/main/m/mc/mc_4.5.55-1.2woody5_ia64.deb
          Size/MD5 checksum:   689186 df58ef7f32905a5c4ade98dab6013ef0
        http://security.debian.org/pool/updates/main/m/mc/mc-common_4.5.55-1.2woody5_ia64.deb
          Size/MD5 checksum:  1351652 6530011245a834c8df64a972855b3995
    
      HP Precision architecture:
    
        http://security.debian.org/pool/updates/main/m/mc/gmc_4.5.55-1.2woody5_hppa.deb
          Size/MD5 checksum:  1144490 2d28d59dacd0d57ade92139783897a52
        http://security.debian.org/pool/updates/main/m/mc/mc_4.5.55-1.2woody5_hppa.deb
          Size/MD5 checksum:   541214 cae4c0accc681cb6d74bebcd38424657
        http://security.debian.org/pool/updates/main/m/mc/mc-common_4.5.55-1.2woody5_hppa.deb
          Size/MD5 checksum:  1352116 9b18a11f41ad50f53787129cbb70ee45
    
      Motorola 680x0 architecture:
    
        http://security.debian.org/pool/updates/main/m/mc/gmc_4.5.55-1.2woody5_m68k.deb
          Size/MD5 checksum:   957852 622795322c8d3ccb1f844ca4e80fbc07
        http://security.debian.org/pool/updates/main/m/mc/mc_4.5.55-1.2woody5_m68k.deb
          Size/MD5 checksum:   436992 28fe37f13b19930168d06a6092e4295e
        http://security.debian.org/pool/updates/main/m/mc/mc-common_4.5.55-1.2woody5_m68k.deb
          Size/MD5 checksum:  1352176 83bdc91613abb383a2ba65e39b86ec17
    
      Big endian MIPS architecture:
    
        http://security.debian.org/pool/updates/main/m/mc/gmc_4.5.55-1.2woody5_mips.deb
          Size/MD5 checksum:  1087044 ca4c17d34d697187723ed33915949171
        http://security.debian.org/pool/updates/main/m/mc/mc_4.5.55-1.2woody5_mips.deb
          Size/MD5 checksum:   536772 f797b059e1baf558a147296545ab308c
        http://security.debian.org/pool/updates/main/m/mc/mc-common_4.5.55-1.2woody5_mips.deb
          Size/MD5 checksum:  1352072 de11cf9737a1835a78db10a9f9e01677
    
      Little endian MIPS architecture:
    
        http://security.debian.org/pool/updates/main/m/mc/gmc_4.5.55-1.2woody5_mipsel.deb
          Size/MD5 checksum:  1081206 15555616a4587281d589d6c4d75fff4d
        http://security.debian.org/pool/updates/main/m/mc/mc_4.5.55-1.2woody5_mipsel.deb
          Size/MD5 checksum:   535634 44ba98ca679814dca5414955ade5477c
        http://security.debian.org/pool/updates/main/m/mc/mc-common_4.5.55-1.2woody5_mipsel.deb
          Size/MD5 checksum:  1351830 d4dd86b51fd4f80034323d8fb7fed93e
    
      PowerPC architecture:
    
        http://security.debian.org/pool/updates/main/m/mc/gmc_4.5.55-1.2woody5_powerpc.deb
          Size/MD5 checksum:  1043048 fa3c76890db2a3eb8910630dda4e2ee1
        http://security.debian.org/pool/updates/main/m/mc/mc_4.5.55-1.2woody5_powerpc.deb
          Size/MD5 checksum:   490084 f9a035d0cabd0b5a2208a83ccdb262d3
        http://security.debian.org/pool/updates/main/m/mc/mc-common_4.5.55-1.2woody5_powerpc.deb
          Size/MD5 checksum:  1352100 07c82e678f74390eb7be89ca324faaad
    
      IBM S/390 architecture:
    
        http://security.debian.org/pool/updates/main/m/mc/gmc_4.5.55-1.2woody5_s390.deb
          Size/MD5 checksum:  1029952 d114807d61819ad87a705d9c145e4e69
        http://security.debian.org/pool/updates/main/m/mc/mc_4.5.55-1.2woody5_s390.deb
          Size/MD5 checksum:   479508 b9ce19425fb67653ca449f13a564c5b6
        http://security.debian.org/pool/updates/main/m/mc/mc-common_4.5.55-1.2woody5_s390.deb
          Size/MD5 checksum:  1352022 66290d632d0aeefd2758a9b09c41bd00
    
      Sun Sparc architecture:
    
        http://security.debian.org/pool/updates/main/m/mc/gmc_4.5.55-1.2woody5_sparc.deb
          Size/MD5 checksum:  1029094 189ad1f55bee5b1f45f8286830c59413
        http://security.debian.org/pool/updates/main/m/mc/mc_4.5.55-1.2woody5_sparc.deb
          Size/MD5 checksum:   483478 f693c3a851ff549e7ea1e64dc993f776
        http://security.debian.org/pool/updates/main/m/mc/mc-common_4.5.55-1.2woody5_sparc.deb
          Size/MD5 checksum:  1352114 e26e3f182414e28488950d059bfeee61
    
    
      These files will probably be moved into the stable distribution on
      its next update.
    
    - ---------------------------------------------------------------------------------
    For apt-get: deb http://security.debian.org/ stable/updates main
    For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"7","type":"x","order":"1","pct":58.33,"resources":[]},{"id":"88","title":"Should be more technical","votes":"3","type":"x","order":"2","pct":25,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"2","type":"x","order":"3","pct":16.67,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.