drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Pufferüberlauf in nasm
Name: |
Pufferüberlauf in nasm |
|
ID: |
USN-648-1 |
|
Distribution: |
Ubuntu |
|
Plattformen: |
Ubuntu 8.04 LTS |
|
Datum: |
Di, 30. September 2008, 22:44 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-2719 |
|
Applikationen: |
NASM - The Netwide Assembler |
|
Originalnachricht |
--===============0261012565696754986== Content-Type: multipart/signed; micalg=pgp-sha1; protocol="application/pgp-signature"; boundary="AhhlLboLdkugWU4S" Content-Disposition: inline
--AhhlLboLdkugWU4S Content-Type: text/plain; charset=us-ascii Content-Disposition: inline
=========================================================== Ubuntu Security Notice USN-648-1 September 30, 2008 nasm vulnerability CVE-2008-2719 ===========================================================
A security issue affects the following Ubuntu releases:
Ubuntu 8.04 LTS
This advisory also applies to the corresponding versions of Kubuntu, Edubuntu, and Xubuntu.
The problem can be corrected by upgrading your system to the following package versions:
Ubuntu 8.04 LTS: nasm 0.99.06-2ubuntu0.1
In general, a standard system upgrade is sufficient to effect the necessary changes.
Details follow:
Philipp Thomas discovered that the ppscan function of nasm contained an off-by-one error. If a user or automated system were tricked into assembling a specially crafted ASM file, a remote attacker could execute arbitrary commands with user privileges.
Updated packages for Ubuntu 8.04 LTS:
Source archives:
nasm_0.99.06-2ubuntu0.1.diff.gz Size/MD5: 15907 894daa05dae4714c30419c98b2ceb40a nasm_0.99.06-2ubuntu0.1.dsc Size/MD5: 726 fb0bf3fde692980711ad529666405912 http://security.ubuntu.com/ubuntu/pool/main/n/nasm/nasm_0.99.06.orig.tar.gz Size/MD5: 867891 78a0e7b7785ff4241f454310d3c48f14
amd64 architecture (Athlon64, Opteron, EM64T Xeon):
nasm_0.99.06-2ubuntu0.1_amd64.deb Size/MD5: 839692 8041418bc0d1fef019e9109be3996e71
i386 architecture (x86 compatible Intel/AMD):
nasm_0.99.06-2ubuntu0.1_i386.deb Size/MD5: 817098 57dc7b6ff3cce6ced499b6f8b479c06e
lpia architecture (Low Power Intel Architecture):
http://ports.ubuntu.com/pool/main/n/nasm/nasm_0.99.06-2ubuntu0.1_lpia.deb Size/MD5: 819156 e360526accd52ef2b4c57599c0833147
powerpc architecture (Apple Macintosh G3/G4/G5):
nasm_0.99.06-2ubuntu0.1_powerpc.deb Size/MD5: 844482 0c9b6c75f820f1929c6285590398cbfe
sparc architecture (Sun SPARC/UltraSPARC):
http://ports.ubuntu.com/pool/main/n/nasm/nasm_0.99.06-2ubuntu0.1_sparc.deb Size/MD5: 826730 b6fa477b03ba11303d63254aac7ee960
--AhhlLboLdkugWU4S Content-Type: application/pgp-signature; name="signature.asc" Content-Description: Digital signature Content-Disposition: inline
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux) Comment: Kees Cook <kees@outflux.net>
iEYEARECAAYFAkjijd4ACgkQH/9LqRcGPm0X7wCaAicA9+zI1VGepAyhDq7Bh1sw y7wAnROAosWP6+2SSkPQWz+mPr8N1DiD =pqCy -----END PGP SIGNATURE-----
--AhhlLboLdkugWU4S--
--===============0261012565696754986== Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline
-- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
--===============0261012565696754986==--
|
|
|
|