-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

[slackware-security]  mc (SSA:2004-136-01)

New mc packages are available for Slackware 9.0, 9.1, and -current to
fix security issues that These could lead to a denial of service or the
execution of arbitrary code as the user running mc.

Sites that use mc should upgrade to the new mc package.

More details about this issue may be found in the Common
Vulnerabilities and Exposures (CVE) database:

  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0226
  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0231
  http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0232

Here are the details from the Slackware 9.1 ChangeLog:
+--------------------------+
Fri May 14 15:11:37 PDT 2004
patches/packages/mc-4.6.0-i486-2.tgz:  Patched to fix buffer overflow,
  format string, and temporary file creation vulnerabilities found by
  Andrew V. Samoilov and Pavel Roskin.  These could lead to a denial of
  service or the execution of arbitrary code as the user running mc.
  For more details, see:
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0226
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0231
    http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0232
  (* Security fix *)
+--------------------------+


Where to find the new packages:
+-----------------------------+

Updated package for Slackware 9.0:

Updated package for Slackware 9.1:

Updated package for Slackware -current:


MD5 signatures:
+-------------+

Slackware 9.0 package:
e74a8dcdd90f2846e4bbac75a154ad39  mc-4.6.0-i386-2.tgz

Slackware 9.1 package:
ac580a4f3556aaae92be0fd754866a55  mc-4.6.0-i486-2.tgz

Slackware -current package:
ce9b9ab338ee114c5d9038e8420db1e7  mc-4.6.0-i486-2.tgz


Installation instructions:
+------------------------+

Upgrade the mc package as root:
# upgradepkg mc-4.6.0-i486-2.tgz


+-----+

Slackware: 2004-136-01: mc Security Update

May 17, 2004
New mc packages are available for Slackware 9.0, 9.1, and -current to fix security issues that These could lead to a denial of service or the execution of arbitrary code as the use...

Summary

Here are the details from the Slackware 9.1 ChangeLog: Fri May 14 15:11:37 PDT 2004 patches/packages/mc-4.6.0-i486-2.tgz: Patched to fix buffer overflow, format string, and temporary file creation vulnerabilities found by Andrew V. Samoilov and Pavel Roskin. These could lead to a denial of service or the execution of arbitrary code as the user running mc. For more details, see: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0226 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0231 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0232 (* Security fix *)

Where Find New Packages

Updated package for Slackware 9.0:
Updated package for Slackware 9.1:
Updated package for Slackware -current:

MD5 Signatures

Slackware 9.0 package: e74a8dcdd90f2846e4bbac75a154ad39 mc-4.6.0-i386-2.tgz
Slackware 9.1 package: ac580a4f3556aaae92be0fd754866a55 mc-4.6.0-i486-2.tgz
Slackware -current package: ce9b9ab338ee114c5d9038e8420db1e7 mc-4.6.0-i486-2.tgz

Severity
[slackware-security] mc (SSA:2004-136-01)
New mc packages are available for Slackware 9.0, 9.1, and -current to fix security issues that These could lead to a denial of service or the execution of arbitrary code as the user running mc.
Sites that use mc should upgrade to the new mc package.
More details about this issue may be found in the Common Vulnerabilities and Exposures (CVE) database:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0226 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0231 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0232

Installation Instructions

Installation instructions: Upgrade the mc package as root: # upgradepkg mc-4.6.0-i486-2.tgz

Related News