Lesezeichen hinzufügen
Originalnachricht
-----BEGIN PGP SIGNED MESSAGE-----Hash: SHA1- --------------------------------------------------------------------------Debian Security Advisory DSA 1009-1 security@debian.orghttp://www.debian.org/security/ Martin SchulzeMarch 21st, 2006 http://www.debian.org/security/faq- --------------------------------------------------------------------------Package : crossfireVulnerability : buffer overflowProblem type : remoteDebian-specific: noCVE ID : CVE-2006-1236A buffer overflow has been discovered in the crossfire game whichallows remote attackers to execute arbitrary code.For the old stable distribution (woody) this problem has been fixed inversion 1.1.0-1woody2.For the stable distribution (sarge) this problem has been fixed inversion 1.6.0.dfsg.1-4sarge2.For the unstable distribution (sid) this problem has been fixed inversion 1.9.0-2.We recommend that you upgrade your crossfire package.Upgrade Instructions- --------------------wget url will fetch the file for youdpkg -i file.deb will install the referenced file.If you are using the apt-get package manager, use the line forsources.list as given below:apt-get update will update the internal databaseapt-get upgrade will install corrected packagesYou may use an automated update by adding the resources from thefooter to the proper configuration.Debian GNU/Linux 3.0 alias woody- -------------------------------- Source archives: crossfire_1.1.0-1woody2.dsc Size/MD5 checksum: 648 c87ae4538c9f9ce8af57fddcdddf3c9e crossfire_1.1.0-1woody2.diff.gz Size/MD5 checksum: 47426 6b0532a7a8748e3e5a5d81dc25350d13 crossfire_1.1.0.orig.tar.gz Size/MD5 checksum: 3057431 824e6d9a91ee0321629a9e99ad4e264f Architecture independent components: crossfire-doc_1.1.0-1woody2_all.deb Size/MD5 checksum: 584480 1c75de6980f66906bd52fbca399e2857 Alpha architecture: crossfire-edit_1.1.0-1woody2_alpha.deb Size/MD5 checksum: 193802 a932826e54d713e18d5393e9036fda02 crossfire-server_1.1.0-1woody2_alpha.deb Size/MD5 checksum: 2097946 e9dca904054c7fcf5bcf29e294ad333b ARM architecture: crossfire-edit_1.1.0-1woody2_arm.deb Size/MD5 checksum: 156404 89d0da5ac8daffb2e6e064a9eb84fe8b crossfire-server_1.1.0-1woody2_arm.deb Size/MD5 checksum: 1994212 f4ce8a9b872dd465f748ce2e706801e4 Intel IA-32 architecture: crossfire-edit_1.1.0-1woody2_i386.deb Size/MD5 checksum: 141220 5f5913df2c1a253d1b4d23ef91877712 crossfire-server_1.1.0-1woody2_i386.deb Size/MD5 checksum: 1954014 9c1c622d75f4a1125c74e7910a9a1842 Intel IA-64 architecture: crossfire-edit_1.1.0-1woody2_ia64.deb Size/MD5 checksum: 243816 97e96103f5b19a73963a14041f12d141 crossfire-server_1.1.0-1woody2_ia64.deb Size/MD5 checksum: 2224064 1b392240b1de7ef6cc5656a0244d45b0 HP Precision architecture: crossfire-edit_1.1.0-1woody2_hppa.deb Size/MD5 checksum: 175634 52f5ff61bc7c8eeab9aef678ccd023b0 crossfire-server_1.1.0-1woody2_hppa.deb Size/MD5 checksum: 2047990 ae204aed290fe71f37f2fd8693c1acb3 Motorola 680x0 architecture: crossfire-edit_1.1.0-1woody2_m68k.deb Size/MD5 checksum: 131890 3470c9b54fa4afe91af8d855260756f9 crossfire-server_1.1.0-1woody2_m68k.deb Size/MD5 checksum: 1925486 b0057f324e5faafec58416264d42e423 Big endian MIPS architecture: crossfire-edit_1.1.0-1woody2_mips.deb Size/MD5 checksum: 170520 0853eab7b91be44f7340712aa4cdd671 crossfire-server_1.1.0-1woody2_mips.deb Size/MD5 checksum: 2035256 79844b4d370cafd330e94566a0d648ff Little endian MIPS architecture: crossfire-edit_1.1.0-1woody2_mipsel.deb Size/MD5 checksum: 169288 33b97adf5cac97c6c875bdd4b36e381c crossfire-server_1.1.0-1woody2_mipsel.deb Size/MD5 checksum: 2035352 bc8cb7e86de9a7d8dd45a2304f7c5a16 PowerPC architecture: crossfire-edit_1.1.0-1woody2_powerpc.deb Size/MD5 checksum: 162678 bb01745d0447bf0ff0059e021582f573 crossfire-server_1.1.0-1woody2_powerpc.deb Size/MD5 checksum: 1998462 5984f0c34413a56816d251f667eb8742 IBM S/390 architecture: crossfire-edit_1.1.0-1woody2_s390.deb Size/MD5 checksum: 146146 363914f85b686bb91c6b70acbbe12b73 crossfire-server_1.1.0-1woody2_s390.deb Size/MD5 checksum: 1969362 fd2f926627e1007841d31cdeb74f82eb Sun Sparc architecture: crossfire-edit_1.1.0-1woody2_sparc.deb Size/MD5 checksum: 156562 5a114c075a3a74b6a67309131417d505 crossfire-server_1.1.0-1woody2_sparc.deb Size/MD5 checksum: 1986776 ed5b96118b9ee6e037dbc931782ade23Debian GNU/Linux 3.1 alias sarge- -------------------------------- Source archives: crossfire_1.6.0.dfsg.1-4sarge2.dsc Size/MD5 checksum: 712 29da4111a63870ce67ed75a14a4c338c crossfire_1.6.0.dfsg.1-4sarge2.diff.gz Size/MD5 checksum: 284676 5e40a45fac4a9b0cb828cdd20a8ec3d5 crossfire_1.6.0.dfsg.1.orig.tar.gz Size/MD5 checksum: 4329330 67c8ee71b0539d369231764b19cc787e Architecture independent components: crossfire-doc_1.6.0.dfsg.1-4sarge2_all.deb Size/MD5 checksum: 888740 8d5bca10c51c61f905118dd1342bd5e0 Alpha architecture: crossfire-edit_1.6.0.dfsg.1-4sarge2_alpha.deb Size/MD5 checksum: 374720 f0d7b9d29175e6c782397abae95bda50 crossfire-server_1.6.0.dfsg.1-4sarge2_alpha.deb Size/MD5 checksum: 2759264 2d103be9f1139ccef05292419a7f9fe6 AMD64 architecture: crossfire-edit_1.6.0.dfsg.1-4sarge2_amd64.deb Size/MD5 checksum: 340982 d6a0d30f69c174e65798444b26a7ffbf crossfire-server_1.6.0.dfsg.1-4sarge2_amd64.deb Size/MD5 checksum: 2643944 76f0702338eabd86bacc5bf7770d7659 ARM architecture: crossfire-edit_1.6.0.dfsg.1-4sarge2_arm.deb Size/MD5 checksum: 333522 71d3c49ff54106298d8e719d5c1f41ca crossfire-server_1.6.0.dfsg.1-4sarge2_arm.deb Size/MD5 checksum: 2639562 7a22211f4745afa931da217d160d3ba0 Intel IA-32 architecture: crossfire-edit_1.6.0.dfsg.1-4sarge2_i386.deb Size/MD5 checksum: 329094 8106898d7874492399f83ffbb2ac52f2 crossfire-server_1.6.0.dfsg.1-4sarge2_i386.deb Size/MD5 checksum: 2625260 5e52ce516bf3ab4c100cc9f7ff51787d Intel IA-64 architecture: crossfire-edit_1.6.0.dfsg.1-4sarge2_ia64.deb Size/MD5 checksum: 409472 e1bd34614a0833aa566a73f48de8532f crossfire-server_1.6.0.dfsg.1-4sarge2_ia64.deb Size/MD5 checksum: 2854244 7f0ebd5971220d7beaaeedf2bf796f75 HP Precision architecture: crossfire-edit_1.6.0.dfsg.1-4sarge2_hppa.deb Size/MD5 checksum: 351562 f050142a068a5ff3db8672826ba3a2cc crossfire-server_1.6.0.dfsg.1-4sarge2_hppa.deb Size/MD5 checksum: 2682006 68c5cf62151994d83e0c23fbc71711f0 Motorola 680x0 architecture: crossfire-edit_1.6.0.dfsg.1-4sarge2_m68k.deb Size/MD5 checksum: 307692 2053682d4e1c6fc81f2a27c9bffa8229 crossfire-server_1.6.0.dfsg.1-4sarge2_m68k.deb Size/MD5 checksum: 2570064 97af44855c45fdc51c39639654a344e0 Big endian MIPS architecture: crossfire-edit_1.6.0.dfsg.1-4sarge2_mips.deb Size/MD5 checksum: 348728 4186c9554fdfe3d7b9d90a6c7f5c1b8d crossfire-server_1.6.0.dfsg.1-4sarge2_mips.deb Size/MD5 checksum: 2657662 db60d5c20ede7be0ba33ca5b9ddfdd8e Little endian MIPS architecture: crossfire-edit_1.6.0.dfsg.1-4sarge2_mipsel.deb Size/MD5 checksum: 347064 152226eb00bbe0650bf763e9b47af923 crossfire-server_1.6.0.dfsg.1-4sarge2_mipsel.deb Size/MD5 checksum: 2656254 40764b19b22bc2e75f83146e6a0e72d9 PowerPC architecture: crossfire-edit_1.6.0.dfsg.1-4sarge2_powerpc.deb Size/MD5 checksum: 342622 a58d7ae35a639e20d0a42826654c0fcf crossfire-server_1.6.0.dfsg.1-4sarge2_powerpc.deb Size/MD5 checksum: 2651940 b9558856a293a97527919b784009bae9 IBM S/390 architecture: crossfire-edit_1.6.0.dfsg.1-4sarge2_s390.deb Size/MD5 checksum: 336700 07dae1c1fb770e9474bdbbed7847def6 crossfire-server_1.6.0.dfsg.1-4sarge2_s390.deb Size/MD5 checksum: 2642014 457a9bd118ff00e5bd257c8887cc40c8 Sun Sparc architecture: crossfire-edit_1.6.0.dfsg.1-4sarge2_sparc.deb Size/MD5 checksum: 330976 6cfb55259f593ee029a1ed670fb1dfb8 crossfire-server_1.6.0.dfsg.1-4sarge2_sparc.deb Size/MD5 checksum: 2626952 b4bddff33520b2ef2f8b16a08201ed6d These files will probably be moved into the stable distribution on its next update.- ---------------------------------------------------------------------------------For apt-get: deb http://security.debian.org/ stable/updates mainFor dpkg-ftp: ftp://security.debian.org/debian-securitydists/stable/updates/mainMailing list: debian-security-announce@lists.debian.orgPackage info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>-----BEGIN PGP SIGNATURE-----Version: GnuPG v1.4.2.2 (GNU/Linux)iD8DBQFEHlmUW5ql+IAeqTIRAj0pAJ9mCePBwtnONvHuIEGRTwhY/AomAgCdEr8yDf90CXeE+t39Ytx9updqtCw==jwoO-----END PGP SIGNATURE------- To UNSUBSCRIBE, email to debian-security-announce-REQUEST@lists.debian.orgwith a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org