[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[debian-users:44431] [Translate] [SECURITY] [DSA 773-1] New amd64 packages fix several bugs



かねこです。
URL 等は Debian-security-announce メーリングリストの元記事を確認
ください。

------>8------------>8------------>8------------>8------------>8-
- --------------------------------------------------------------------------
Debian Security Advisory DSA 773-1                     security@debian.org
http://www.debian.org/security/                             Martin Schulze
August 11th, 2005                       http://www.debian.org/security/faq
- --------------------------------------------------------------------------

Package        : 複数
Vulnerability  : 複数
Problem-Type   : ローカルおよびリモート
Debian-specific: いいえ

この勧告は、安定版 (stable) amd64 ディストリビューションに対してのセキュ
リティサポートの開始のお知らせです。現在まだ公式とはなっていない amd64
ポートに対して、sarge リリース以降の未リリースであった全セキュリティアッ
プデートが対象です。以降のセキュリティ勧告に関しても、このポートに対して
の更新が含まれます。

アップグレード手順
------------------

wget url
	でファイルを取得できます。
dpkg -i file.deb
        で参照されたファイルをインストールできます。

を用いて、apt-get パッケージマネージャに以下記載の sources.list を与えて
次のコマンドを使ってください。

apt-get update
        これは内部データベースを更新します。
apt-get upgrade
        これで修正されたパッケージをインストールします。

本メールのフッタ記載の設定を自ホストの設定に加えることにより、自動更新を
行うこともできます。

Debian GNU/Linux 3.1 愛称 sarge
- --------------------------------

  DSA 762: several vulnerabilities

    http://security.debian.org/pool/updates/main/a/affix/affix_2.1.1-2_amd64.deb
      Size/MD5 checksum:    93348 f20cd77b0317a52a22ff3fc3e56f9149

http://security.debian.org/pool/updates/main/a/affix/libaffix-dev_2.1.1-2_amd64.deb
      Size/MD5 checksum:    71740 ec4d663b7ff2b343a61189a0f6d4c916
    http://security.debian.org/pool/updates/main/a/affix/libaffix2_2.1.1-2_amd64.deb
      Size/MD5 checksum:    64380 e4d7160dbb8ad9b8f8584cfcaaebdc3b

  DSA 754: insecure temporary file


http://security.debian.org/pool/updates/main/c/centericq/centericq_4.20.0-1sarge1_amd64.deb
      Size/MD5 checksum:  1355084 cc43eefcbb317474e9a514796efed4e3

http://security.debian.org/pool/updates/main/c/centericq/centericq-common_4.20.0-1sarge1_amd64.deb
      Size/MD5 checksum:   335606 3f90e36c020c22f2d60253e74ced43a4

http://security.debian.org/pool/updates/main/c/centericq/centericq-fribidi_4.20.0-1sarge1_amd64.deb
      Size/MD5 checksum:  1355304 637be8166b0238ebf635f5bd04e502b8

http://security.debian.org/pool/updates/main/c/centericq/centericq-utf8_4.20.0-1sarge1_amd64.deb
      Size/MD5 checksum:  1355140 a1170292ee01c2685db6bc6cc994e2cd

  DSA 737: remote denial of service


http://security.debian.org/pool/updates/main/c/clamav/clamav_0.84-2.sarge.1_amd64.deb
      Size/MD5 checksum:    68864 644b5553035ddc9ca5dc132246ee4897

http://security.debian.org/pool/updates/main/c/clamav/clamav-daemon_0.84-2.sarge.1_amd64.deb
      Size/MD5 checksum:    44172 0f16aa6f739fde9413c0233c56f5cc42

http://security.debian.org/pool/updates/main/c/clamav/clamav-freshclam_0.84-2.sarge.1_amd64.deb
      Size/MD5 checksum:  2173184 e9879e707f562d2cf64236d17123af60

http://security.debian.org/pool/updates/main/c/clamav/clamav-milter_0.84-2.sarge.1_amd64.deb
      Size/MD5 checksum:    39990 b1f65575fc3d37aa86dd755410f3849e

http://security.debian.org/pool/updates/main/c/clamav/libclamav-dev_0.84-2.sarge.1_amd64.deb
      Size/MD5 checksum:   174648 880af48cf071b62a2bc80983122a74b4

http://security.debian.org/pool/updates/main/c/clamav/libclamav1_0.84-2.sarge.1_amd64.deb
      Size/MD5 checksum:   256930 2d065a8e4cd0926de5361daa7d151eac

  DSA 733: insecure temporary files

    http://security.debian.org/pool/updates/main/c/crip/crip_3.5-1sarge2_amd64.deb
      Size/MD5 checksum:    44156 a92ab5ec7041cc1c9d74cef0fa5fa6ae

  DSA 742: buffer overflow


http://security.debian.org/pool/updates/main/c/cvs/cvs_1.11.1p1debian-11_amd64.deb
      Size/MD5 checksum:  1112862 0966106e6979ddf41d47b1516932ba45

  DSA 750: out-of-bound memory access


http://security.debian.org/pool/updates/main/d/dhcpcd/dhcpcd_1.3.22pl4-21sarge1_amd64.deb
      Size/MD5 checksum:    59966 b964f129473b7292b13279f83c7eabb7

  DSA 760, DSA 767: several vulnerabilities

    http://security.debian.org/pool/updates/main/e/ekg/ekg_1.5+20050411-5_amd64.deb
      Size/MD5 checksum:   279102 40da7948eafae25a64a2399e62811145

http://security.debian.org/pool/updates/main/e/ekg/libgadu-dev_1.5+20050411-5_amd64.deb
      Size/MD5 checksum:   129224 df578d41daa5c1f5c3038707c73e86b8

http://security.debian.org/pool/updates/main/e/ekg/libgadu3_1.5+20050411-5_amd64.deb
      Size/MD5 checksum:    64526 919fc4c40591d30411d5696e263bab2d

  DSA 749: format string error


http://security.debian.org/pool/updates/main/e/ettercap/ettercap_0.7.1-1sarge1_amd64.deb
      Size/MD5 checksum:   184934 e4e5d87dafcd98bee77a4aa784ca3765

http://security.debian.org/pool/updates/main/e/ettercap/ettercap-common_0.7.1-1sarge1_amd64.deb
      Size/MD5 checksum:   299876 181ed120b92c9985d773d2db51136191

http://security.debian.org/pool/updates/main/e/ettercap/ettercap-gtk_0.7.1-1sarge1_amd64.deb
      Size/MD5 checksum:   221274 2c9255a0801c04f779e264bae84781ac

  DSA 744: programming error


http://security.debian.org/pool/updates/main/f/fuse/fuse-utils_2.2.1-4sarge2_amd64.deb
      Size/MD5 checksum:    41090 1f39fb3d1e5aa450c60f6c96597b3f8c

http://security.debian.org/pool/updates/main/f/fuse/libfuse-dev_2.2.1-4sarge2_amd64.deb
      Size/MD5 checksum:    56350 14f3bbc10a6b3be0837362bf95e613d1

http://security.debian.org/pool/updates/main/f/fuse/libfuse2_2.2.1-4sarge2_amd64.deb
      Size/MD5 checksum:    33926 32e5605f7cf8932ba53257c259fd78b2

  DSA 734, DSA 7699: denial of service, memory alignment bug

    http://security.debian.org/pool/updates/main/g/gaim/gaim_1.2.1-1.4_amd64.deb
      Size/MD5 checksum:   937244 44dc68d95badf0887e7a9a4be36ef6e0
    http://security.debian.org/pool/updates/main/g/gaim/gaim-dev_1.2.1-1.4_amd64.deb
      Size/MD5 checksum:   102458 056299acb24b04c238857feca296b340

  DSA 753: format string


http://security.debian.org/pool/updates/main/g/gedit/gedit_2.8.3-4sarge1_amd64.deb
      Size/MD5 checksum:   492138 bc1f860708f84b153cfc3822b83c096b

  DSA 770: insecure tmpfile creation


http://security.debian.org/pool/updates/main/g/gopher/gopher_3.0.7sarge1_amd64.deb
      Size/MD5 checksum:   130092 e3c7ef64140db42178b3f727eefa2228

  DSA 761: insecure temporary files


http://security.debian.org/pool/updates/main/h/heartbeat/heartbeat_1.2.3-9sarge2_amd64.deb
      Size/MD5 checksum:   525792 8566d49e1f2604695d03dc55970974da

http://security.debian.org/pool/updates/main/h/heartbeat/heartbeat-dev_1.2.3-9sarge2_amd64.deb
      Size/MD5 checksum:   126004 63b865090d20bdda1a89f8cbde1f5ca8

http://security.debian.org/pool/updates/main/h/heartbeat/libpils-dev_1.2.3-9sarge2_amd64.deb
      Size/MD5 checksum:    61634 0270d25e71831509f5f294affaaf48cf

http://security.debian.org/pool/updates/main/h/heartbeat/libpils0_1.2.3-9sarge2_amd64.deb
      Size/MD5 checksum:    52326 2f94113427489d9290c5a844d8fb3ef6

http://security.debian.org/pool/updates/main/h/heartbeat/libstonith-dev_1.2.3-9sarge2_amd64.deb
      Size/MD5 checksum:    29842 e1627454181f3256bb69a42a60fa861e

http://security.debian.org/pool/updates/main/h/heartbeat/libstonith0_1.2.3-9sarge2_amd64.deb
      Size/MD5 checksum:    88868 ff2beb5e04eee075ad7b5f6ef75ce914

http://security.debian.org/pool/updates/main/h/heartbeat/stonith_1.2.3-9sarge2_amd64.deb
      Size/MD5 checksum:    30834 7dad23bbef2dfc40add963543918d889

  DSA 758, DSA 765: buffer overflows


http://security.debian.org/pool/updates/main/h/heimdal/heimdal-clients_0.6.3-10sarge1_amd64.deb
      Size/MD5 checksum:   278522 a0718fa42dee37068db77cb18b7a6319

http://security.debian.org/pool/updates/main/h/heimdal/heimdal-clients-x_0.6.3-10sarge1_amd64.deb
      Size/MD5 checksum:    65984 d4706aabdbb5d84aeec4878f80ba1e85

http://security.debian.org/pool/updates/main/h/heimdal/heimdal-dev_0.6.3-10sarge1_amd64.deb
      Size/MD5 checksum:   471474 81a7db0e2f9da98448ada5060f38b9f7

http://security.debian.org/pool/updates/main/h/heimdal/heimdal-kdc_0.6.3-10sarge1_amd64.deb
      Size/MD5 checksum:   136002 0e12187d9466b3c956d3cfa6c76646b8

http://security.debian.org/pool/updates/main/h/heimdal/heimdal-servers_0.6.3-10sarge1_amd64.deb
      Size/MD5 checksum:   176930 cd9f3a156afc87154e94d53b8f953572

http://security.debian.org/pool/updates/main/h/heimdal/heimdal-servers-x_0.6.3-10sarge1_amd64.deb
      Size/MD5 checksum:    43120 50c31f5b437bb3ea53e20892e68f94a7

http://security.debian.org/pool/updates/main/h/heimdal/libasn1-6-heimdal_0.6.3-10sarge1_amd64.deb
      Size/MD5 checksum:    76858 e659f50448c3f622f95ff9fe0b30bcc4

http://security.debian.org/pool/updates/main/h/heimdal/libgssapi1-heimdal_0.6.3-10sarge1_amd64.deb
      Size/MD5 checksum:    53628 3876c69d7980c0eec5affbeb1c71af42

http://security.debian.org/pool/updates/main/h/heimdal/libhdb7-heimdal_0.6.3-10sarge1_amd64.deb
      Size/MD5 checksum:    53188 e41084931ccac2277531faf280ffd657

http://security.debian.org/pool/updates/main/h/heimdal/libkadm5clnt4-heimdal_0.6.3-10sarge1_amd64.deb
      Size/MD5 checksum:    38314 93431fa20ee9125e9908bad090ddfd92

http://security.debian.org/pool/updates/main/h/heimdal/libkadm5srv7-heimdal_0.6.3-10sarge1_amd64.deb
      Size/MD5 checksum:    48634 0d0f59aa89e35bfe6a8bb02d07bcf1a0

http://security.debian.org/pool/updates/main/h/heimdal/libkafs0-heimdal_0.6.3-10sarge1_amd64.deb
      Size/MD5 checksum:    37234 694f87eec9ace45593e03a0145fe2bab

http://security.debian.org/pool/updates/main/h/heimdal/libkrb5-17-heimdal_0.6.3-10sarge1_amd64.deb
      Size/MD5 checksum:   143832 db4250198e7b0f2da6127a12952e318b

  DSA 743: buffer overflows, integer overflows

    http://security.debian.org/pool/updates/main/h/ht/ht_0.8.0-2sarge4_amd64.deb
      Size/MD5 checksum:   531186 25cf7b9e7a03de9b20c3f228c991ed22

  DSA 757: buffer overflow, double-free memory


http://security.debian.org/pool/updates/main/k/krb5/krb5-admin-server_1.3.6-2sarge2_amd64.deb
      Size/MD5 checksum:   103952 a1bad7b0cb8b18f364f757eac8a94f2c

http://security.debian.org/pool/updates/main/k/krb5/krb5-clients_1.3.6-2sarge2_amd64.deb
      Size/MD5 checksum:   216248 b296329fbeb6a6f2a49f789e3acc17ce

http://security.debian.org/pool/updates/main/k/krb5/krb5-ftpd_1.3.6-2sarge2_amd64.deb
      Size/MD5 checksum:    56336 7e05a80d20ea210791bd1eb266f49a7e

http://security.debian.org/pool/updates/main/k/krb5/krb5-kdc_1.3.6-2sarge2_amd64.deb
      Size/MD5 checksum:   124082 1e425dabc2d917506024d6c63e0e1b54

http://security.debian.org/pool/updates/main/k/krb5/krb5-rsh-server_1.3.6-2sarge2_amd64.deb
      Size/MD5 checksum:    82128 bc3129c51bce75fb98489cf5598a33d6

http://security.debian.org/pool/updates/main/k/krb5/krb5-telnetd_1.3.6-2sarge2_amd64.deb
      Size/MD5 checksum:    62880 ae50e1618cbfc1159a25b3b6cf6b6b51

http://security.debian.org/pool/updates/main/k/krb5/krb5-user_1.3.6-2sarge2_amd64.deb
      Size/MD5 checksum:   137088 8308257a29fa9c7aeaa3e6e69c26866a

http://security.debian.org/pool/updates/main/k/krb5/libkadm55_1.3.6-2sarge2_amd64.deb
      Size/MD5 checksum:   176964 5541c67a17e88a35a1693aacd3ac6f20

http://security.debian.org/pool/updates/main/k/krb5/libkrb5-dev_1.3.6-2sarge2_amd64.deb
      Size/MD5 checksum:   651660 595c6aa1d44b013a5f848939e2463ee9

http://security.debian.org/pool/updates/main/k/krb5/libkrb53_1.3.6-2sarge2_amd64.deb
      Size/MD5 checksum:   368756 ba1a2761c8839afa64dfa240e9481288

  DSA 771: several vulnerabilities


http://security.debian.org/pool/updates/main/p/pdns/pdns_2.9.17-13sarge1_amd64.deb
      Size/MD5 checksum:    16006 d1f474c458d77bf83c906188d301bfb0

http://security.debian.org/pool/updates/main/p/pdns/pdns-backend-geo_2.9.17-13sarge1_amd64.deb
      Size/MD5 checksum:   106804 c0bb95df466aed853386993ad5f5e251

http://security.debian.org/pool/updates/main/p/pdns/pdns-backend-ldap_2.9.17-13sarge1_amd64.deb
      Size/MD5 checksum:   188340 bd750bb60a24fcc52121c4667e3e11e6

http://security.debian.org/pool/updates/main/p/pdns/pdns-backend-mysql_2.9.17-13sarge1_amd64.deb
      Size/MD5 checksum:    89098 4d822c7082526782e4baeaac4e3bcbd9

http://security.debian.org/pool/updates/main/p/pdns/pdns-backend-pgsql_2.9.17-13sarge1_amd64.deb
      Size/MD5 checksum:    57286 53089cae1e705dc85511a7aaae5c7da1

http://security.debian.org/pool/updates/main/p/pdns/pdns-backend-pipe_2.9.17-13sarge1_amd64.deb
      Size/MD5 checksum:    66370 ad9e364e079f4a80ab63b232dd00049a

http://security.debian.org/pool/updates/main/p/pdns/pdns-backend-sqlite_2.9.17-13sarge1_amd64.deb
      Size/MD5 checksum:    52818 06566ea9631d8bdb2792fe6bb17ba327

http://security.debian.org/pool/updates/main/p/pdns/pdns-recursor_2.9.17-13sarge1_amd64.deb
      Size/MD5 checksum:   162490 96ad6d4e522188708da7caeb90970e68

http://security.debian.org/pool/updates/main/p/pdns/pdns-server_2.9.17-13sarge1_amd64.deb
      Size/MD5 checksum:   566040 65bc4610c763e2254a6488a9aec1a5c9

  DSA 725: missing privilege release


http://security.debian.org/pool/updates/main/p/ppxp/ppxp_0.2001080415-10sarge2_amd64.deb
      Size/MD5 checksum:   240190 bb69a870e1f49042a4703b368d17d6c5

http://security.debian.org/pool/updates/main/p/ppxp/ppxp-dev_0.2001080415-10sarge2_amd64.deb
      Size/MD5 checksum:    74498 00604fe63f4c324bd1afe2d897770f65

http://security.debian.org/pool/updates/main/p/ppxp/ppxp-tcltk_0.2001080415-10sarge2_amd64.deb
      Size/MD5 checksum:    60870 75cbed2a76f5cea23a8c862f3c3a4a14

http://security.debian.org/pool/updates/main/p/ppxp/ppxp-x11_0.2001080415-10sarge2_amd64.deb
      Size/MD5 checksum:    68586 757d9d9469a4cdad5f49d45fa09d8734

  DSA 728: missing privilege release


http://security.debian.org/pool/updates/main/q/qpopper/qpopper_4.0.5-4sarge1_amd64.deb
      Size/MD5 checksum:   415030 903c9e8a07c01d247fd349556217690e

http://security.debian.org/pool/updates/main/q/qpopper/qpopper-drac_4.0.5-4sarge1_amd64.deb
      Size/MD5 checksum:   416602 e97849158c71b4a21e29dee69b33ec7c

  DSA 738: remote denial of service


http://security.debian.org/pool/updates/main/r/razor/razor_2.670-1sarge2_amd64.deb
      Size/MD5 checksum:   116184 1ccb6ccfb9560ce78cf1a4d6eee7ce48

  DSA 748: bad default value


http://security.debian.org/pool/updates/main/r/ruby1.8/libdbm-ruby1.8_1.8.2-7sarge1_amd64.deb
      Size/MD5 checksum:   134268 4b4996e21f1aa4f0cfe9fa2bcf551f7b

http://security.debian.org/pool/updates/main/r/ruby1.8/libgdbm-ruby1.8_1.8.2-7sarge1_amd64.deb
      Size/MD5 checksum:   135696 33dcd5ae5a84421da01a215a51da1422

http://security.debian.org/pool/updates/main/r/ruby1.8/libopenssl-ruby1.8_1.8.2-7sarge1_amd64.deb
      Size/MD5 checksum:   232378 6c541f1a11b3f446a5c8af954f41f25e

http://security.debian.org/pool/updates/main/r/ruby1.8/libreadline-ruby1.8_1.8.2-7sarge1_amd64.deb
      Size/MD5 checksum:   131836 4360a0a705563bf01e5c58227ec2065c

http://security.debian.org/pool/updates/main/r/ruby1.8/libruby1.8_1.8.2-7sarge1_amd64.deb
      Size/MD5 checksum:  1391174 d98b5938cd9dfe6540d35c8323b03a0e

http://security.debian.org/pool/updates/main/r/ruby1.8/libruby1.8-dbg_1.8.2-7sarge1_amd64.deb
      Size/MD5 checksum:   779568 fd2afcfa86e1aebeb8956d4037c5296c

http://security.debian.org/pool/updates/main/r/ruby1.8/libtcltk-ruby1.8_1.8.2-7sarge1_amd64.deb
      Size/MD5 checksum:  1439920 2be5a6776460941112d9a5f8db39d06a

http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8_1.8.2-7sarge1_amd64.deb
      Size/MD5 checksum:   150790 f7e2279c5702afe10ba797fc759e9044

http://security.debian.org/pool/updates/main/r/ruby1.8/ruby1.8-dev_1.8.2-7sarge1_amd64.deb
      Size/MD5 checksum:   648138 8c5d0d77be69b9b7b4599f559c7ad2bc

  DSA 736: remote denial of service


http://security.debian.org/pool/updates/main/s/spamassassin/spamc_3.0.3-2_amd64.deb
      Size/MD5 checksum:    58606 e60be541d4ba035f724746c9af909587

  DSA 735: pathname validation race


http://security.debian.org/pool/updates/main/s/sudo/sudo_1.6.8p7-1.1sarge1_amd64.deb
      Size/MD5 checksum:   169482 6c8b00e7e0536bd55e54edbb28dec5bf

  DSA-740, DSA 763: remote denial of service


http://security.debian.org/pool/updates/main/z/zlib/zlib-bin_1.2.2-4.sarge.2_amd64.deb
      Size/MD5 checksum:    27942 ef4d0d5aca91366a4823f53bf5b9c9b7

http://security.debian.org/pool/updates/main/z/zlib/zlib1g_1.2.2-4.sarge.2_amd64.deb
      Size/MD5 checksum:    67298 ce68f539762dc35d4a4119aa20cf14ef

http://security.debian.org/pool/updates/main/z/zlib/zlib1g-dev_1.2.2-4.sarge.2_amd64.deb
      Size/MD5 checksum:   503740 fa00a365669a212af5470fb2ba29fcad



 これらのファイルは次の版の安定版リリース時そちらに移されます。

- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
------>8------------>8------------>8------------>8------------>8-
-- 
Seiji Kaneko                         skaneko@xxxxxxxxxxxx
---------------------------------------------------------