[PLDSA 32-1] New noffle packages fix buffer overflows
Krzysiek Taraszka
dzimi at pld.org.pl
Sat May 3 14:46:36 CEST 2003
- --------------------------------------------------------------------------
PLD Security Advisory PLDSA 32-1 security at pld.org.pl
http://www.pld.org.pl/security/ PLD Security Team
05 March 2003 http://www.pld.org.pl/security/faq
- --------------------------------------------------------------------------
Package : prior to noffle-1.0.1-1
Vulnerability : buffer overflows
Problem-Type : remote
PLD-specific : no
CVE references : CAN-2003-0037
Dan Jacobson noticed a problem in noffle, an offline news server, that
leads to a segmentation fault. It is not yet clear whether this
problem is exploitable. However, if it is, a remote attacker could
trigger arbitrary code execution under the user that calls noffle,
probably news.
The above problems have been fixed in version 1.0.1-2 for the
current stable distribution (ra).
We recommend that you upgrade your noffle packages.
wget -c url
will fetch the file for you
rpm -Uhv file(s)*.rpm
will upgrade the referenced file.
If you are using "poldek" - the package manager, use the line as given below
for upgrade packages
poldek --update
will update the internal database
poldek --upgrade 'noffle*'
will install corrected packages
If you are using "apt" - the package manager, use the line as given below
for upgrade packages
apt-get update
will update the internal database
apt-get upgrade 'noffle*'
will install corrected packages
PLD Linux 1.0 alias ra
- --------------------
Source archives:
ftp://ftp.pld.org.pl/dists/ra/updates/security/SRPMS/noffle-1.0.1-2.src.rpm
MD5 checksum: 3ff8ad8621f9d5e69cf079bfe775a82b
I386 Architecture components:
ftp://ftp.pld.org.pl/dists/ra/updates/security/i386/noffle-1.0.1-2.i386.rpm
MD5 checksum: ce8078a792e4fb38d81173d4aadbf080
I586 Architecture components:
ftp://ftp.pld.org.pl/dists/ra/updates/security/i586/noffle-1.0.1-2.i586.rpm
MD5 checksum: 7b17156b26880e38487e41ce5894a5ec
I686 Architecture components:
ftp://ftp.pld.org.pl/dists/ra/updates/security/i686/noffle-1.0.1-2.i686.rpm
MD5 checksum: 4eb58b09fbdd5ee4eb968a8449e0cf91
PowerPC Architecture components:
ftp://ftp.pld.org.pl/dists/ra/updates/security/ppc/noffle-1.0.1-2.ppc.rpm
MD5 checksum: 04811cbec36899eec63e52a01d4842cb
-
--------------------------------------------------------------------------------
-
If you are using poldek add this line to poldek.conf.
If you are using apt-get add this line to sources.list.
For i386 architecture
poldek: source = ra-updates-security ftp://ftp.pld.org.pl/dists/ra/updates/security/i386/
apt-get: rpm ftp://ftp.pld.org.pl/dists ra/apt/i386 base updates-security
For i586 architecture
poldek: source = ra-updates-security ftp://ftp.pld.org.pl/dists/ra/updates/security/i586/
apt-get: rpm ftp://ftp.pld.org.pl/dists ra/apt/i586 base updates-security
For i686 architecture
poldek: source = ra-updates-security ftp://ftp.pld.org.pl/dists/ra/updates/security/i686/
apt-get: rpm ftp://ftp.pld.org.pl/dists ra/apt/i686 base updates-security
For ppc architecture
poldek: source = ra-updates-security ftp://ftp.pld.org.pl/dists/ra/updates/security/ppc/
apt-get: rpm ftp://ftp.pld.org.pl/dists ra/apt/ppc base updates-security
More information about the pld-security-announce
mailing list