<<< Date Index >>>     <<< Thread Index >>>

[SECURITY] [DSA 506-1] New neon packages fix buffer overflow



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- --------------------------------------------------------------------------
Debian Security Advisory DSA 506-1                     security@xxxxxxxxxx
http://www.debian.org/security/                             Martin Schulze
May 19th, 2004                          http://www.debian.org/security/faq
- --------------------------------------------------------------------------

Package        : neon
Vulnerability  : buffer overflow
Problem-Type   : remote
Debian-specific: no
CVE ID         : CAN-2004-0398

Stefan Esser discovered a problem in neon, an HTTP and WebDAV client
library.  User input is copied into variables not large enough for all
cases.  This can lead to an overflow of a static heap variable.

For the stable distribution (woody) this problem has been fixed in
version 0.19.3-2woody5.

For the unstable distribution (sid) this problem has been fixed in
version 0.23.9.dfsg-2 and neon_0.24.6.dfsg-1.

We recommend that you upgrade your libneon* packages.


Upgrade Instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 3.0 alias woody
- --------------------------------

  Source archives:

    http://security.debian.org/pool/updates/main/n/neon/neon_0.19.3-2woody5.dsc
      Size/MD5 checksum:      582 3d56a54cb45ab8f3d4362b7c6d77162a
    
http://security.debian.org/pool/updates/main/n/neon/neon_0.19.3-2woody5.diff.gz
      Size/MD5 checksum:     4590 fbf528e0831e4889cc0494b4be900f51
    http://security.debian.org/pool/updates/main/n/neon/neon_0.19.3.orig.tar.gz
      Size/MD5 checksum:   499574 9dbb8c276e5fc58a707b6e908abdce63

  Alpha architecture:

    
http://security.debian.org/pool/updates/main/n/neon/libneon-dev_0.19.3-2woody5_alpha.deb
      Size/MD5 checksum:   122312 d31561604a3da54a6cae7f2ccd612828
    
http://security.debian.org/pool/updates/main/n/neon/libneon19_0.19.3-2woody5_alpha.deb
      Size/MD5 checksum:    78170 37abde4cbeda1ce079b05d2b8bf9c955

  ARM architecture:

    
http://security.debian.org/pool/updates/main/n/neon/libneon-dev_0.19.3-2woody5_arm.deb
      Size/MD5 checksum:   101074 fa3284a7256e294464076c32015137b4
    
http://security.debian.org/pool/updates/main/n/neon/libneon19_0.19.3-2woody5_arm.deb
      Size/MD5 checksum:    70476 a7e666280fe0a2681baa1e4dd8ba669f

  Intel IA-32 architecture:

    
http://security.debian.org/pool/updates/main/n/neon/libneon-dev_0.19.3-2woody5_i386.deb
      Size/MD5 checksum:    94598 f95ec370b3c047730417982e31c5941f
    
http://security.debian.org/pool/updates/main/n/neon/libneon19_0.19.3-2woody5_i386.deb
      Size/MD5 checksum:    66520 58ffe032027ccb9c14907bc0c938a28a

  Intel IA-64 architecture:

    
http://security.debian.org/pool/updates/main/n/neon/libneon-dev_0.19.3-2woody5_ia64.deb
      Size/MD5 checksum:   131498 f6258285344c581c08e4926ba0adf0ac
    
http://security.debian.org/pool/updates/main/n/neon/libneon19_0.19.3-2woody5_ia64.deb
      Size/MD5 checksum:    96528 af653cafe30dd6777297ec06500ba95e

  HP Precision architecture:

    
http://security.debian.org/pool/updates/main/n/neon/libneon-dev_0.19.3-2woody5_hppa.deb
      Size/MD5 checksum:   118810 4b963efbb146e3f26b6a646c4e890399
    
http://security.debian.org/pool/updates/main/n/neon/libneon19_0.19.3-2woody5_hppa.deb
      Size/MD5 checksum:    81036 0a459c8029dc66c93f1ba7a9aa44e0ee

  Motorola 680x0 architecture:

    
http://security.debian.org/pool/updates/main/n/neon/libneon-dev_0.19.3-2woody5_m68k.deb
      Size/MD5 checksum:    93374 f2e3c294a1831f0f7a9fccc6ae49d2d6
    
http://security.debian.org/pool/updates/main/n/neon/libneon19_0.19.3-2woody5_m68k.deb
      Size/MD5 checksum:    67940 e731dfac9cdae2c6fcd08667aad0d5ae

  Big endian MIPS architecture:

    
http://security.debian.org/pool/updates/main/n/neon/libneon-dev_0.19.3-2woody5_mips.deb
      Size/MD5 checksum:   110964 bd6ba022967dca47da799db51cb589bd
    
http://security.debian.org/pool/updates/main/n/neon/libneon19_0.19.3-2woody5_mips.deb
      Size/MD5 checksum:    68904 72d371ddb0efe9e1eea03321f16aa9a6

  Little endian MIPS architecture:

    
http://security.debian.org/pool/updates/main/n/neon/libneon-dev_0.19.3-2woody5_mipsel.deb
      Size/MD5 checksum:   110762 cd7257f6c9eeaadec1a3f6e4c34c234b
    
http://security.debian.org/pool/updates/main/n/neon/libneon19_0.19.3-2woody5_mipsel.deb
      Size/MD5 checksum:    68904 cb7cea103ae298aa36eaa59217407700

  PowerPC architecture:

    
http://security.debian.org/pool/updates/main/n/neon/libneon-dev_0.19.3-2woody5_powerpc.deb
      Size/MD5 checksum:   107422 63e1113ef9dade9dc42d5fac7d957943
    
http://security.debian.org/pool/updates/main/n/neon/libneon19_0.19.3-2woody5_powerpc.deb
      Size/MD5 checksum:    71764 1b3da349d23b5be195c4242ff7de5ccc

  IBM S/390 architecture:

    
http://security.debian.org/pool/updates/main/n/neon/libneon-dev_0.19.3-2woody5_s390.deb
      Size/MD5 checksum:    97206 08a7c4289846d8a38e00e7f083d68d6d
    
http://security.debian.org/pool/updates/main/n/neon/libneon19_0.19.3-2woody5_s390.deb
      Size/MD5 checksum:    71170 729713892e8cd548391cae5833618100

  Sun Sparc architecture:

    
http://security.debian.org/pool/updates/main/n/neon/libneon-dev_0.19.3-2woody5_sparc.deb
      Size/MD5 checksum:   102684 206203649c4c0192a5216a1815f69fec
    
http://security.debian.org/pool/updates/main/n/neon/libneon19_0.19.3-2woody5_sparc.deb
      Size/MD5 checksum:    71078 a1f82f303e5adc217f4a6e5f1d413140


  These files will probably be moved into the stable distribution on
  its next update.

- 
---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security 
dists/stable/updates/main
Mailing list: debian-security-announce@xxxxxxxxxxxxxxxx
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (GNU/Linux)

iD8DBQFAqycxW5ql+IAeqTIRAmq6AKCCPEf5ltqFxXV5M2dsy0PHYfc98ACfWDPE
xxRMFkIjvz5q5JSLseJUX4Y=
=6B/W
-----END PGP SIGNATURE-----