Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Sign up!
EnGarde Community
What is the most important Linux security technology?
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Latest Newsletters
Linux Advisory Watch: March 27th, 2015
Linux Security Week: March 23rd, 2015
LinuxSecurity Newsletters
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

Debian: New mc packages fix several vulnerabilities Print E-mail
User Rating:      How can I rate this item?
Posted by Joe Shakespeare   
Debian ndrew V. Samoilov has noticed that several bugfixes which were applied to the source by upstream developers of mc, the midnight commander, a file browser and manager, were not backported to the current version of mc that Debian ships in their stable release.

- --------------------------------------------------------------------------
Debian Security Advisory DSA 639-1                                        Martin Schulze
January 14th, 2005            
- --------------------------------------------------------------------------

Package        : mc
Vulnerability  : several
Problem-Type   : remote
Debian-specific: no
CVE ID         : CAN-2004-1004 CAN-2004-1005 CAN-2004-1009 CAN-2004-1090 CAN-2004-1091 
                 CAN-2004-1092 CAN-2004-1093 CAN-2004-1174 CAN-2004-1175 CAN-2004-1176

Andrew V. Samoilov has noticed that several bugfixes which were
applied to the source by upstream developers of mc, the midnight
commander, a file browser and manager, were not backported to the
current version of mc that Debian ships in their stable release.  The
Common Vulnerabilities and Exposures Project identifies the following


    Multiple format string vulnerabilities


    Multiple buffer overflows


    One infinite loop vulnerability


    Denial of service via  corrupted section header


    Denial of service via null dereference


    Freeing unallocated memory


    Denial of service via use of already freed memory


    Denial of service via manipulating non-existing file handles


    Unintended program execution via insecure filename quoting


    Denial of service via a buffer underflow

For the stable distribution (woody) these problems have been fixed in
version 4.5.55-1.2woody5

For the unstable distribution (sid) these problems should already be
fixed since they were backported from current versions.

We recommend that you upgrade your mc package.

Upgrade Instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 3.0 alias woody
- --------------------------------

  Source archives:
      Size/MD5 checksum:      798 09408d39e539898d3384293454b806a8
      Size/MD5 checksum:    51884 64d27d64149013cbbfcbe0d568f872af
      Size/MD5 checksum:  4850321 82772e729bb2ecfe486a6c219ebab09f

  Alpha architecture:
      Size/MD5 checksum:  1186490 28bce9bd85c73413c4e610a83f6c80dd
      Size/MD5 checksum:   562942 519466cca7aa730a64c5ff629fe64112
      Size/MD5 checksum:  1351654 7b7e2ee396427d08f38bb2610533fb25

  ARM architecture:
      Size/MD5 checksum:  1028206 7bc8143ab26f4c42ef99de8f86d30604
      Size/MD5 checksum:   480562 94e93aaa4a2dccb4b3acde553091fce7
      Size/MD5 checksum:  1351824 cd5a6b905f11fd1661a16e790bf1f588

  Intel IA-32 architecture:
      Size/MD5 checksum:   994986 0c53de4cf192308977e39bb4a7216314
      Size/MD5 checksum:   455878 7a09ac156183bc9cee032d674e21587c
      Size/MD5 checksum:  1351766 fe4f6d051f36930a1533ac7239d5759f

  Intel IA-64 architecture:
      Size/MD5 checksum:  1435394 06eb2692e366aa35d3aa39f2903253a7
      Size/MD5 checksum:   689186 df58ef7f32905a5c4ade98dab6013ef0
      Size/MD5 checksum:  1351652 6530011245a834c8df64a972855b3995

  HP Precision architecture:
      Size/MD5 checksum:  1144490 2d28d59dacd0d57ade92139783897a52
      Size/MD5 checksum:   541214 cae4c0accc681cb6d74bebcd38424657
      Size/MD5 checksum:  1352116 9b18a11f41ad50f53787129cbb70ee45

  Motorola 680x0 architecture:
      Size/MD5 checksum:   957852 622795322c8d3ccb1f844ca4e80fbc07
      Size/MD5 checksum:   436992 28fe37f13b19930168d06a6092e4295e
      Size/MD5 checksum:  1352176 83bdc91613abb383a2ba65e39b86ec17

  Big endian MIPS architecture:
      Size/MD5 checksum:  1087044 ca4c17d34d697187723ed33915949171
      Size/MD5 checksum:   536772 f797b059e1baf558a147296545ab308c
      Size/MD5 checksum:  1352072 de11cf9737a1835a78db10a9f9e01677

  Little endian MIPS architecture:
      Size/MD5 checksum:  1081206 15555616a4587281d589d6c4d75fff4d
      Size/MD5 checksum:   535634 44ba98ca679814dca5414955ade5477c
      Size/MD5 checksum:  1351830 d4dd86b51fd4f80034323d8fb7fed93e

  PowerPC architecture:
      Size/MD5 checksum:  1043048 fa3c76890db2a3eb8910630dda4e2ee1
      Size/MD5 checksum:   490084 f9a035d0cabd0b5a2208a83ccdb262d3
      Size/MD5 checksum:  1352100 07c82e678f74390eb7be89ca324faaad

  IBM S/390 architecture:
      Size/MD5 checksum:  1029952 d114807d61819ad87a705d9c145e4e69
      Size/MD5 checksum:   479508 b9ce19425fb67653ca449f13a564c5b6
      Size/MD5 checksum:  1352022 66290d632d0aeefd2758a9b09c41bd00

  Sun Sparc architecture:
      Size/MD5 checksum:  1029094 189ad1f55bee5b1f45f8286830c59413
      Size/MD5 checksum:   483478 f693c3a851ff549e7ea1e64dc993f776
      Size/MD5 checksum:  1352114 e26e3f182414e28488950d059bfeee61

  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb stable/updates main
For dpkg-ftp: dists/stable/updates/main
Mailing list:

< Prev   Next >


Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2015 Guardian Digital, Inc. All rights reserved.