Debian: neon Heap overflow vulnerability
Summary
Stefan Esser discovered a problem in neon, an HTTP and WebDAV client
library. User input is copied into variables not large enough for all
cases. This can lead to an overflow of a static heap variable.
For the stable distribution (woody) this problem has been fixed in
version 0.19.3-2woody5.
For the unstable distribution (sid) this problem has been fixed in
version 0.23.9.dfsg-2 and neon_0.24.6.dfsg-1.
We recommend that you upgrade your libneon* packages.
Upgrade Instructions
- --------------------
wget url
will fetch the file for you
dpkg -i file.deb
will install the referenced file.
If you are using the apt-get package manager, use the line for
sources.list as given below:
apt-get update
will update the internal database
apt-get upgrade
will install corrected packages
You may use an automated update by adding the resources from the
footer to the proper configuration.
Debian GNU/Linux 3.0 alias woody
Source archives:
Size/MD5 checksum: 582 3d56a54cb45ab8f3d4362b7c6d77162a
Size/MD5 checksum: 4590 fbf528e0831e4889cc0494b4be900f51
Size/MD5 checksum: 499574 9dbb8c276e5fc58a707b6e908abdce63
Alpha architecture:
Size/MD5 checksum: 122312 d31561604a3da54a6cae7f2ccd612828
Size/MD5 checksum: 78170 37abde4cbeda1ce079b05d2b8bf9c955
ARM architecture:
Size/MD5 checksum: 101074 fa3284a7256e294464076c32015137b4
Size/MD5 checksum: 70476 a7e666280fe0a2681baa1e4dd8ba669f
Intel IA-32 architecture:
Size/MD5 checksum: 94598 f95ec370b3c047730417982e31c5941f
Size/MD5 checksum: 66520 58ffe032027ccb9c14907bc0c938a28a
Intel IA-64 architecture:
Size/MD5 checksum: 131498 f6258285344c581c08e4926ba0adf0ac
Size/MD5 checksum: 96528 af653cafe30dd6777297ec06500ba95e
HP Precision architecture:
Size/MD5 checksum: 118810 4b963efbb146e3f26b6a646c4e890399
Size/MD5 checksum: 81036 0a459c8029dc66c93f1ba7a9aa44e0ee
Motorola 680x0 architecture:
Size/MD5 checksum: 93374 f2e3c294a1831f0f7a9fccc6ae49d2d6
Size/MD5 checksum: 67940 e731dfac9cdae2c6fcd08667aad0d5ae
Big endian MIPS architecture:
Size/MD5 checksum: 110964 bd6ba022967dca47da799db51cb589bd
Size/MD5 checksum: 68904 72d371ddb0efe9e1eea03321f16aa9a6
Little endian MIPS architecture:
Size/MD5 checksum: 110762 cd7257f6c9eeaadec1a3f6e4c34c234b
Size/MD5 checksum: 68904 cb7cea103ae298aa36eaa59217407700
PowerPC architecture:
Size/MD5 checksum: 107422 63e1113ef9dade9dc42d5fac7d957943
Size/MD5 checksum: 71764 1b3da349d23b5be195c4242ff7de5ccc
IBM S/390 architecture:
Size/MD5 checksum: 97206 08a7c4289846d8a38e00e7f083d68d6d
Size/MD5 checksum: 71170 729713892e8cd548391cae5833618100
Sun Sparc architecture:
Size/MD5 checksum: 102684 206203649c4c0192a5216a1815f69fec
Size/MD5 checksum: 71078 a1f82f303e5adc217f4a6e5f1d413140
These files will probably be moved into the stable distribution on
its next update.
For apt-get: deb Debian -- Security Information stable/updates main
For dpkg-ftp: dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show