From security@linux-mandrake.com Fri Aug 13 17:41:35 2004 From: Mandrake Linux Security Team To: bugtraq@securityfocus.com Date: 13 Aug 2004 02:18:04 -0000 Subject: MDKSA-2004:081 - Updated gaim packages fix remotely exploitable vulnerabilities -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 _______________________________________________________________________ Mandrakelinux Security Update Advisory _______________________________________________________________________ Package name: gaim Advisory ID: MDKSA-2004:081 Date: August 12th, 2004 Affected versions: 10.0, 9.2 ______________________________________________________________________ Problem Description: Sebastian Krahmer discovered two remotely exploitable buffer overflow vulnerabilities in the gaim instant messenger. The updated packages are patched to correct the problems. _______________________________________________________________________ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0500 ______________________________________________________________________ Updated Packages: Mandrakelinux 10.0: cd9dd302c9cf47474de3b68162e038d7 10.0/RPMS/gaim-0.75-5.2.100mdk.i586.rpm e6e3b3ba3f58b754ba67c1df966fd2b5 10.0/RPMS/gaim-encrypt-0.75-5.2.100mdk.i586.rpm 065fc37af5a298e7d50e164ce3dda44a 10.0/RPMS/gaim-festival-0.75-5.2.100mdk.i586.rpm b3f5a8d16d3d103087518aaa3e65f157 10.0/RPMS/gaim-perl-0.75-5.2.100mdk.i586.rpm 93226c0caef4ea3580056816fb1cf1c9 10.0/RPMS/libgaim-remote0-0.75-5.2.100mdk.i586.rpm da6cf3c123ba4ba3847b4fda08fa0561 10.0/RPMS/libgaim-remote0-devel-0.75-5.2.100mdk.i586.rpm 56e190d0008657188b8faad013da92d6 10.0/SRPMS/gaim-0.75-5.2.100mdk.src.rpm Mandrakelinux 10.0/AMD64: 9be3eaff0c3562c758c8228d1dea00a1 amd64/10.0/RPMS/gaim-0.75-5.2.100mdk.amd64.rpm e3074c7a9517e92cf78cca45f984a29f amd64/10.0/RPMS/gaim-encrypt-0.75-5.2.100mdk.amd64.rpm f69b4c70daf8abb5bc6a75436e8291b7 amd64/10.0/RPMS/gaim-festival-0.75-5.2.100mdk.amd64.rpm 66964eaea125fc331631933b1d98c6a7 amd64/10.0/RPMS/gaim-perl-0.75-5.2.100mdk.amd64.rpm 9828f602d92f5c5b08e9a2077efcb765 amd64/10.0/RPMS/lib64gaim-remote0-0.75-5.2.100mdk.amd64.rpm 6c4a8298b328a4854c01010a7cca0bf2 amd64/10.0/RPMS/lib64gaim-remote0-devel-0.75-5.2.100mdk.amd64.rpm 56e190d0008657188b8faad013da92d6 amd64/10.0/SRPMS/gaim-0.75-5.2.100mdk.src.rpm Mandrakelinux 9.2: e98c583bb9c3943993fbd56c6a81919e 9.2/RPMS/gaim-0.75-1.4.92mdk.i586.rpm 11d435795713f8358ac35a3b41ef9a34 9.2/RPMS/gaim-encrypt-0.75-1.4.92mdk.i586.rpm ef120aa0028475e83d9a517eaf621655 9.2/RPMS/gaim-festival-0.75-1.4.92mdk.i586.rpm 4ec686dec9501be0f64e4ae3819ffbb7 9.2/RPMS/gaim-perl-0.75-1.4.92mdk.i586.rpm 6a83e3edb461168b5dbe3302afd7613d 9.2/RPMS/libgaim-remote0-0.75-1.4.92mdk.i586.rpm 7363ae25ab1b9e505f8fc4bd87f5cb23 9.2/RPMS/libgaim-remote0-devel-0.75-1.4.92mdk.i586.rpm d00e9aebb8e72bc383b7bf92738ba760 9.2/SRPMS/gaim-0.75-1.4.92mdk.src.rpm Mandrakelinux 9.2/AMD64: dfee511b5d144d18b2cf68faa9a7b223 amd64/9.2/RPMS/gaim-0.75-1.4.92mdk.amd64.rpm d3fe81c29663245a9f9bad8d60a3ac1a amd64/9.2/RPMS/gaim-encrypt-0.75-1.4.92mdk.amd64.rpm 267917ef901b303e8a310a7dc7e30f48 amd64/9.2/RPMS/gaim-festival-0.75-1.4.92mdk.amd64.rpm 100e0b60e07a1c3efc68a7020cff4be1 amd64/9.2/RPMS/gaim-perl-0.75-1.4.92mdk.amd64.rpm 46cb3c308880118d37c1a64cfbf35d41 amd64/9.2/RPMS/lib64gaim-remote0-0.75-1.4.92mdk.amd64.rpm 309b8b6fe13048051319848222223f28 amd64/9.2/RPMS/lib64gaim-remote0-devel-0.75-1.4.92mdk.amd64.rpm d00e9aebb8e72bc383b7bf92738ba760 amd64/9.2/SRPMS/gaim-0.75-1.4.92mdk.src.rpm _______________________________________________________________________ To upgrade automatically use MandrakeUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you. All packages are signed by Mandrakesoft for security. You can obtain the GPG public key of the Mandrakelinux Security Team by executing: gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98 You can view other update advisories for Mandrakelinux at: http://www.mandrakesoft.com/security/advisories If you want to report vulnerabilities, please contact security_linux-mandrake.com Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Linux Mandrake Security Team -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.7 (GNU/Linux) iD8DBQFBHCTbmqjQ0CJFipgRAhI7AKDY68p7p5ES8vP1sgISmcFDnFU3MQCgwj6t YFVmKRyhsCJKvLIfunxQfJU= =/dw0 -----END PGP SIGNATURE-----