--------------------------------------------------------------------------
Debian Security Advisory DSA 274-1                     security@debian.org 
Debian -- Security Information                              Martin Schulze
August 29th, 2003                        Debian -- Debian security FAQ 
--------------------------------------------------------------------------

Package        : node
Vulnerability  : buffer overflow, format string
Problem-Type   : remote
Debian-specific: no

Morgan alias SM6TKY discovered and fixed several security related
problems in LinuxNode, an Amateur Packet Radio Node program.  The
buffer overflow he discovered can be used to gain unauthorised root
access and can be remotely triggered.

For the stable distribution (woody) this problem has been
fixed in version 0.3.0a-2woody1.

For the unstable distribution (sid) this problem has been fixed in
version 0.3.2-1.

We recommend that you upgrade your node packages immediately.


Upgrade Instructions
--------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 3.0 alias woody
--------------------------------

  Source archives:

      
      Size/MD5 checksum:      588 1efa176d975c1e05370f8ba964516797
      
      Size/MD5 checksum:     6480 188fb0de8bf4e0befe24381e0dae20de
      
      Size/MD5 checksum:    53547 8aff48a8744aa6ee6eaf1daa7c3b92f8

  Alpha architecture:

      
      Size/MD5 checksum:    64240 520c82abc8809f56870724351ed6de39

  ARM architecture:

      
      Size/MD5 checksum:    47708 7f7955e0159549de75ec925f2237b7c9

  Intel IA-32 architecture:

      
      Size/MD5 checksum:    47484 dbf928e7f52f5194fea6a03d2d3fdf01

  Intel IA-64 architecture:

      
      Size/MD5 checksum:    67634 71cc9de2aa3c9ad0145ff0aa3e0a29b3

  HP Precision architecture:

      
      Size/MD5 checksum:    52174 57c6db7ca08a02988fc0fb2b8bbe23eb

  Motorola 680x0 architecture:

      
      Size/MD5 checksum:    45790 7089cd0cb435322faed03e167a6e7dc7

  Big endian MIPS architecture:

      
      Size/MD5 checksum:    52166 c6918f854b286a0b1fe46c1a4a2e0853

  Little endian MIPS architecture:

      
      Size/MD5 checksum:    52240 3e214a4217e6fee4c7aa32f84770c02a

  PowerPC architecture:

      
      Size/MD5 checksum:    49514 a599cf448a4c2bc3618aa0a404742c3f

  IBM S/390 architecture:

      
      Size/MD5 checksum:    48998 7cc2ae72a9c975d78be45cd82f115116

  Sun Sparc architecture:

      
      Size/MD5 checksum:    49524 e086b527ec73a28d9ac2109249c71691


  These files will probably be moved into the stable distribution on
  its next revision.

---------------------------------------------------------------------------------
For apt-get: deb  Debian -- Security Information  stable/updates main
For dpkg-ftp:    dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show ' and  http://packages.debian.org/

Debian: 'node' buffer overflow, format string

August 29, 2003
Morgan alias SM6TKY discovered and fixed several security relatedproblems in LinuxNode, an Amateur Packet Radio Node program

Summary

Morgan alias SM6TKY discovered and fixed several security related
problems in LinuxNode, an Amateur Packet Radio Node program. The
buffer overflow he discovered can be used to gain unauthorised root
access and can be remotely triggered.

For the stable distribution (woody) this problem has been
fixed in version 0.3.0a-2woody1.

For the unstable distribution (sid) this problem has been fixed in
version 0.3.2-1.

We recommend that you upgrade your node packages immediately.


Upgrade Instructions
--------------------

wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
will update the internal database
apt-get upgrade
will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 3.0 alias woody
--------------------------------

Source archives:


Size/MD5 checksum: 588 1efa176d975c1e05370f8ba964516797

Size/MD5 checksum: 6480 188fb0de8bf4e0befe24381e0dae20de

Size/MD5 checksum: 53547 8aff48a8744aa6ee6eaf1daa7c3b92f8

Alpha architecture:


Size/MD5 checksum: 64240 520c82abc8809f56870724351ed6de39

ARM architecture:


Size/MD5 checksum: 47708 7f7955e0159549de75ec925f2237b7c9

Intel IA-32 architecture:


Size/MD5 checksum: 47484 dbf928e7f52f5194fea6a03d2d3fdf01

Intel IA-64 architecture:


Size/MD5 checksum: 67634 71cc9de2aa3c9ad0145ff0aa3e0a29b3

HP Precision architecture:


Size/MD5 checksum: 52174 57c6db7ca08a02988fc0fb2b8bbe23eb

Motorola 680x0 architecture:


Size/MD5 checksum: 45790 7089cd0cb435322faed03e167a6e7dc7

Big endian MIPS architecture:


Size/MD5 checksum: 52166 c6918f854b286a0b1fe46c1a4a2e0853

Little endian MIPS architecture:


Size/MD5 checksum: 52240 3e214a4217e6fee4c7aa32f84770c02a

PowerPC architecture:


Size/MD5 checksum: 49514 a599cf448a4c2bc3618aa0a404742c3f

IBM S/390 architecture:


Size/MD5 checksum: 48998 7cc2ae72a9c975d78be45cd82f115116

Sun Sparc architecture:


Size/MD5 checksum: 49524 e086b527ec73a28d9ac2109249c71691


These files will probably be moved into the stable distribution on
its next revision.

Severity
Package : node
Vulnerability : buffer overflow, format string
Problem-Type : remote
Debian-specific: no

Related News