Linux Security
Linux Security
Linux Security

Debian: New mc packages fix several vulnerabilities

Date 14 Jan 2005
7312
Posted By Joe Shakespeare
ndrew V. Samoilov has noticed that several bugfixes which were applied to the source by upstream developers of mc, the midnight commander, a file browser and manager, were not backported to the current version of mc that Debian ships in their stable release.

- --------------------------------------------------------------------------
Debian Security Advisory DSA 639-1                     This email address is being protected from spambots. You need JavaScript enabled to view it.
https://www.debian.org/security/                             Martin Schulze
January 14th, 2005                      https://www.debian.org/security/faq
- --------------------------------------------------------------------------

Package        : mc
Vulnerability  : several
Problem-Type   : remote
Debian-specific: no
CVE ID         : CAN-2004-1004 CAN-2004-1005 CAN-2004-1009 CAN-2004-1090 CAN-2004-1091 
                 CAN-2004-1092 CAN-2004-1093 CAN-2004-1174 CAN-2004-1175 CAN-2004-1176

Andrew V. Samoilov has noticed that several bugfixes which were
applied to the source by upstream developers of mc, the midnight
commander, a file browser and manager, were not backported to the
current version of mc that Debian ships in their stable release.  The
Common Vulnerabilities and Exposures Project identifies the following
vulnerabilities:

CAN-2004-1004

    Multiple format string vulnerabilities

CAN-2004-1005

    Multiple buffer overflows

CAN-2004-1009

    One infinite loop vulnerability

CAN-2004-1090

    Denial of service via  corrupted section header

CAN-2004-1091

    Denial of service via null dereference

CAN-2004-1092

    Freeing unallocated memory

CAN-2004-1093

    Denial of service via use of already freed memory

CAN-2004-1174

    Denial of service via manipulating non-existing file handles

CAN-2004-1175

    Unintended program execution via insecure filename quoting

CAN-2004-1176

    Denial of service via a buffer underflow

For the stable distribution (woody) these problems have been fixed in
version 4.5.55-1.2woody5

For the unstable distribution (sid) these problems should already be
fixed since they were backported from current versions.

We recommend that you upgrade your mc package.


Upgrade Instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 3.0 alias woody
- --------------------------------

  Source archives:

    https://security.debian.org/pool/updates/main/m/mc/mc_4.5.55-1.2woody5.dsc
      Size/MD5 checksum:      798 09408d39e539898d3384293454b806a8
    https://security.debian.org/pool/updates/main/m/mc/mc_4.5.55-1.2woody5.diff.gz
      Size/MD5 checksum:    51884 64d27d64149013cbbfcbe0d568f872af
    https://security.debian.org/pool/updates/main/m/mc/mc_4.5.55.orig.tar.gz
      Size/MD5 checksum:  4850321 82772e729bb2ecfe486a6c219ebab09f

  Alpha architecture:

    https://security.debian.org/pool/updates/main/m/mc/gmc_4.5.55-1.2woody5_alpha.deb
      Size/MD5 checksum:  1186490 28bce9bd85c73413c4e610a83f6c80dd
    https://security.debian.org/pool/updates/main/m/mc/mc_4.5.55-1.2woody5_alpha.deb
      Size/MD5 checksum:   562942 519466cca7aa730a64c5ff629fe64112
    https://security.debian.org/pool/updates/main/m/mc/mc-common_4.5.55-1.2woody5_alpha.deb
      Size/MD5 checksum:  1351654 7b7e2ee396427d08f38bb2610533fb25

  ARM architecture:

    https://security.debian.org/pool/updates/main/m/mc/gmc_4.5.55-1.2woody5_arm.deb
      Size/MD5 checksum:  1028206 7bc8143ab26f4c42ef99de8f86d30604
    https://security.debian.org/pool/updates/main/m/mc/mc_4.5.55-1.2woody5_arm.deb
      Size/MD5 checksum:   480562 94e93aaa4a2dccb4b3acde553091fce7
    https://security.debian.org/pool/updates/main/m/mc/mc-common_4.5.55-1.2woody5_arm.deb
      Size/MD5 checksum:  1351824 cd5a6b905f11fd1661a16e790bf1f588

  Intel IA-32 architecture:

    https://security.debian.org/pool/updates/main/m/mc/gmc_4.5.55-1.2woody5_i386.deb
      Size/MD5 checksum:   994986 0c53de4cf192308977e39bb4a7216314
    https://security.debian.org/pool/updates/main/m/mc/mc_4.5.55-1.2woody5_i386.deb
      Size/MD5 checksum:   455878 7a09ac156183bc9cee032d674e21587c
    https://security.debian.org/pool/updates/main/m/mc/mc-common_4.5.55-1.2woody5_i386.deb
      Size/MD5 checksum:  1351766 fe4f6d051f36930a1533ac7239d5759f

  Intel IA-64 architecture:

    https://security.debian.org/pool/updates/main/m/mc/gmc_4.5.55-1.2woody5_ia64.deb
      Size/MD5 checksum:  1435394 06eb2692e366aa35d3aa39f2903253a7
    https://security.debian.org/pool/updates/main/m/mc/mc_4.5.55-1.2woody5_ia64.deb
      Size/MD5 checksum:   689186 df58ef7f32905a5c4ade98dab6013ef0
    https://security.debian.org/pool/updates/main/m/mc/mc-common_4.5.55-1.2woody5_ia64.deb
      Size/MD5 checksum:  1351652 6530011245a834c8df64a972855b3995

  HP Precision architecture:

    https://security.debian.org/pool/updates/main/m/mc/gmc_4.5.55-1.2woody5_hppa.deb
      Size/MD5 checksum:  1144490 2d28d59dacd0d57ade92139783897a52
    https://security.debian.org/pool/updates/main/m/mc/mc_4.5.55-1.2woody5_hppa.deb
      Size/MD5 checksum:   541214 cae4c0accc681cb6d74bebcd38424657
    https://security.debian.org/pool/updates/main/m/mc/mc-common_4.5.55-1.2woody5_hppa.deb
      Size/MD5 checksum:  1352116 9b18a11f41ad50f53787129cbb70ee45

  Motorola 680x0 architecture:

    https://security.debian.org/pool/updates/main/m/mc/gmc_4.5.55-1.2woody5_m68k.deb
      Size/MD5 checksum:   957852 622795322c8d3ccb1f844ca4e80fbc07
    https://security.debian.org/pool/updates/main/m/mc/mc_4.5.55-1.2woody5_m68k.deb
      Size/MD5 checksum:   436992 28fe37f13b19930168d06a6092e4295e
    https://security.debian.org/pool/updates/main/m/mc/mc-common_4.5.55-1.2woody5_m68k.deb
      Size/MD5 checksum:  1352176 83bdc91613abb383a2ba65e39b86ec17

  Big endian MIPS architecture:

    https://security.debian.org/pool/updates/main/m/mc/gmc_4.5.55-1.2woody5_mips.deb
      Size/MD5 checksum:  1087044 ca4c17d34d697187723ed33915949171
    https://security.debian.org/pool/updates/main/m/mc/mc_4.5.55-1.2woody5_mips.deb
      Size/MD5 checksum:   536772 f797b059e1baf558a147296545ab308c
    https://security.debian.org/pool/updates/main/m/mc/mc-common_4.5.55-1.2woody5_mips.deb
      Size/MD5 checksum:  1352072 de11cf9737a1835a78db10a9f9e01677

  Little endian MIPS architecture:

    https://security.debian.org/pool/updates/main/m/mc/gmc_4.5.55-1.2woody5_mipsel.deb
      Size/MD5 checksum:  1081206 15555616a4587281d589d6c4d75fff4d
    https://security.debian.org/pool/updates/main/m/mc/mc_4.5.55-1.2woody5_mipsel.deb
      Size/MD5 checksum:   535634 44ba98ca679814dca5414955ade5477c
    https://security.debian.org/pool/updates/main/m/mc/mc-common_4.5.55-1.2woody5_mipsel.deb
      Size/MD5 checksum:  1351830 d4dd86b51fd4f80034323d8fb7fed93e

  PowerPC architecture:

    https://security.debian.org/pool/updates/main/m/mc/gmc_4.5.55-1.2woody5_powerpc.deb
      Size/MD5 checksum:  1043048 fa3c76890db2a3eb8910630dda4e2ee1
    https://security.debian.org/pool/updates/main/m/mc/mc_4.5.55-1.2woody5_powerpc.deb
      Size/MD5 checksum:   490084 f9a035d0cabd0b5a2208a83ccdb262d3
    https://security.debian.org/pool/updates/main/m/mc/mc-common_4.5.55-1.2woody5_powerpc.deb
      Size/MD5 checksum:  1352100 07c82e678f74390eb7be89ca324faaad

  IBM S/390 architecture:

    https://security.debian.org/pool/updates/main/m/mc/gmc_4.5.55-1.2woody5_s390.deb
      Size/MD5 checksum:  1029952 d114807d61819ad87a705d9c145e4e69
    https://security.debian.org/pool/updates/main/m/mc/mc_4.5.55-1.2woody5_s390.deb
      Size/MD5 checksum:   479508 b9ce19425fb67653ca449f13a564c5b6
    https://security.debian.org/pool/updates/main/m/mc/mc-common_4.5.55-1.2woody5_s390.deb
      Size/MD5 checksum:  1352022 66290d632d0aeefd2758a9b09c41bd00

  Sun Sparc architecture:

    https://security.debian.org/pool/updates/main/m/mc/gmc_4.5.55-1.2woody5_sparc.deb
      Size/MD5 checksum:  1029094 189ad1f55bee5b1f45f8286830c59413
    https://security.debian.org/pool/updates/main/m/mc/mc_4.5.55-1.2woody5_sparc.deb
      Size/MD5 checksum:   483478 f693c3a851ff549e7ea1e64dc993f776
    https://security.debian.org/pool/updates/main/m/mc/mc-common_4.5.55-1.2woody5_sparc.deb
      Size/MD5 checksum:  1352114 e26e3f182414e28488950d059bfeee61


  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb https://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.

Advisories

LinuxSecurity Poll

How frequently do you patch/update your system?

No answer selected. Please try again.
Please select either existing option or enter your own, however not both.
Please select minimum 0 answer(s) and maximum 3 answer(s).
/main-polls/52-how-frequently-do-you-patch-update-your-system?task=poll.vote&format=json
52
radio
[{"id":"179","title":"As soon as patches\/updates are released - I track advisories for my distro(s) diligently","votes":"41","type":"x","order":"1","pct":83.67,"resources":[]},{"id":"180","title":"Every so often, when I think of it","votes":"4","type":"x","order":"2","pct":8.16,"resources":[]},{"id":"181","title":"Hardly ever","votes":"4","type":"x","order":"3","pct":8.16,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350

Please vote first in order to view vote results.

VOTE ON THE POLL PAGE


VIEW MORE POLLS

bottom 200

Please enable / Bitte aktiviere JavaScript!
Veuillez activer / Por favor activa el Javascript![ ? ]

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.