Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Sign up!
EnGarde Community
What is the most important Linux security technology?
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Latest Newsletters
Linux Security Week: March 30th, 2015
Linux Advisory Watch: March 27th, 2015
LinuxSecurity Newsletters
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

Debian: New gedit packages fix denial of service Print E-mail
User Rating:      How can I rate this item?
Posted by Benjamin D. Thomas   
Debian A format string vulnerability has been discovered in gedit, a light-weight text editor for GNOME, that may allow attackers to cause a denial of service (application crash) via a binary file with format string specifiers in the filename.
- --------------------------------------------------------------------------
Debian Security Advisory DSA 753-1                                        Martin Schulze
July 12th, 2005               
- --------------------------------------------------------------------------

Package        : gedit
Vulnerability  : format string
Problem-Type   : remote
Debian-specific: no
CVE ID         : CAN-2005-1686

A format string vulnerability has been discovered in gedit, a
light-weight text editor for GNOME, that may allow attackers to cause
a denial of service (application crash) via a binary file with format
string specifiers in the filename.  Since gedit supports opening files
via "http://" URLs (through GNOME vfs) and other schemes, this might
be a remotely exploitable vulnerability.

The old stable distribution (woody) is not vulnerable to this problem.

For the stable distribution (sarge) this problem has been fixed in
version 2.8.3-4sarge1.

For the unstable distribution (sid) this problem has been fixed in
version 2.10.3-1.

We recommend that you upgrade your gedit package.

Upgrade Instructions
- --------------------

wget url
       will fetch the file for you
dpkg -i file.deb
       will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
       will update the internal database
apt-get upgrade
       will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 3.1 alias sarge
- --------------------------------

Source archives:
    Size/MD5 checksum:     1848 99c4beadcf902ee5857c7a3150f4d0ad
    Size/MD5 checksum:    54443 96de2c7d0d757d867f46d36490e0ee92
    Size/MD5 checksum:  4051445 cbbd5999141d6de932a0afdd55f1aa35

Architecture independent components:
    Size/MD5 checksum:  1826070 d8519b91f1a8aeba351b1eca19c17712
    Size/MD5 checksum:    44346 01d42b323e7ffdd2a6aba454996a5a48

Alpha architecture:
    Size/MD5 checksum:   523608 1f183dc0960c8e9405953fb0946a1f8b

ARM architecture:
    Size/MD5 checksum:   457332 476fc39b828ffcd2224f4ce65e71afcc

Intel IA-32 architecture:
    Size/MD5 checksum:   470122 7162c0ac1f1a7ccd2a315d5b4f01f5d2

Intel IA-64 architecture:
    Size/MD5 checksum:   578896 85c408b6b41585ddb5d366a3d8ea8aea

HP Precision architecture:
    Size/MD5 checksum:   505246 2436f36b3b10b36e3af1688e420de02f

Motorola 680x0 architecture:
    Size/MD5 checksum:   459142 d475046c385f0ebd06912d89671f89ef

Big endian MIPS architecture:
    Size/MD5 checksum:   456504 4e3dbf6cf317c281cd5ddfd379bfa6c1

Little endian MIPS architecture:
    Size/MD5 checksum:   455104 c466bd51b370e0bfe4a0133e9f31e87c

PowerPC architecture:
    Size/MD5 checksum:   473552 7f15b8f11abb2cb017bdc8a9069f1940

IBM S/390 architecture:
    Size/MD5 checksum:   492994 d86d79670ebad24391213d3449db0dee

Sun Sparc architecture:
    Size/MD5 checksum:   462362 f24856c85dd4f7782a7377423392db70

These files will probably be moved into the stable distribution on
its next update.

- ---------------------------------------------------------------------------------
For apt-get: deb stable/updates main
For dpkg-ftp: dists/stable/updates/main
Mailing list:
< Prev   Next >


Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2015 Guardian Digital, Inc. All rights reserved.