-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - -------------------------------------------------------------------------- Debian Security Advisory DSA 1023-1 security@debian.org http://www.debian.org/security/ Martin Schulze April 5th, 2006 http://www.debian.org/security/faq - -------------------------------------------------------------------------- Package : kaffeine Vulnerability : buffer overflow Problem type : remote Debian-specific: no CVE ID : CVE-2006-0051 Marcus Meissner discovered that kaffeine, a versatile media player for KDE 3, contains an unchecked buffer that can be overwritten remotely when fetching remote RAM playlists which can cause the execution of arbitrary code. The old stable distribution (woody) does not contain kaffeine packages. For the stable distribution (sarge) this problem has been fixed in version 0.6-1sarge1. For the unstable distribution (sid) this problem will be fixed soon. We recommend that you upgrade your kaffeine package. Upgrade Instructions - -------------------- wget url will fetch the file for you dpkg -i file.deb will install the referenced file. If you are using the apt-get package manager, use the line for sources.list as given below: apt-get update will update the internal database apt-get upgrade will install corrected packages You may use an automated update by adding the resources from the footer to the proper configuration. Debian GNU/Linux 3.1 alias sarge - -------------------------------- Source archives: http://security.debian.org/pool/updates/main/k/kaffeine/kaffeine_0.6-1sarge1.dsc Size/MD5 checksum: 759 41d3e9247746d2ca05fbaf06f8dc5a53 http://security.debian.org/pool/updates/main/k/kaffeine/kaffeine_0.6-1sarge1.diff.gz Size/MD5 checksum: 33485 127c21639b5e960cd72b0f1388a1058f http://security.debian.org/pool/updates/main/k/kaffeine/kaffeine_0.6.orig.tar.gz Size/MD5 checksum: 2237634 0b0398b1ca6bd19a04a8c647dc8252bd Alpha architecture: http://security.debian.org/pool/updates/main/k/kaffeine/kaffeine_0.6-1sarge1_alpha.deb Size/MD5 checksum: 1488988 200ec5b185b2dbe29fc4743f3f6228bc AMD64 architecture: http://security.debian.org/pool/updates/main/k/kaffeine/kaffeine_0.6-1sarge1_amd64.deb Size/MD5 checksum: 1443844 425d1b8ae1c52e8433cbf9e5e4a2e1ac ARM architecture: http://security.debian.org/pool/updates/main/k/kaffeine/kaffeine_0.6-1sarge1_arm.deb Size/MD5 checksum: 1391900 f100be45d4f40600b65967305d2a360e Intel IA-32 architecture: http://security.debian.org/pool/updates/main/k/kaffeine/kaffeine_0.6-1sarge1_i386.deb Size/MD5 checksum: 1430340 b12cdd0adb1cd8150f6805d5e5f6dd76 Intel IA-64 architecture: http://security.debian.org/pool/updates/main/k/kaffeine/kaffeine_0.6-1sarge1_ia64.deb Size/MD5 checksum: 1579154 491295df2cbf29bb449f079406a55d87 HP Precision architecture: http://security.debian.org/pool/updates/main/k/kaffeine/kaffeine_0.6-1sarge1_hppa.deb Size/MD5 checksum: 1475956 afb0dcc722106c43fed478ad0cafa4f6 Motorola 680x0 architecture: http://security.debian.org/pool/updates/main/k/kaffeine/kaffeine_0.6-1sarge1_m68k.deb Size/MD5 checksum: 1398896 852d4c82c346700eee3bafd35fb1eb9c Big endian MIPS architecture: http://security.debian.org/pool/updates/main/k/kaffeine/kaffeine_0.6-1sarge1_mips.deb Size/MD5 checksum: 1387122 a0a28d851754e739cbc5b4882d643a2a Little endian MIPS architecture: http://security.debian.org/pool/updates/main/k/kaffeine/kaffeine_0.6-1sarge1_mipsel.deb Size/MD5 checksum: 1382720 f8506a528a46373b632b1850dfe59597 PowerPC architecture: http://security.debian.org/pool/updates/main/k/kaffeine/kaffeine_0.6-1sarge1_powerpc.deb Size/MD5 checksum: 1398308 69c3fc0cd41ca02e1f04ab34ca1f857e IBM S/390 architecture: http://security.debian.org/pool/updates/main/k/kaffeine/kaffeine_0.6-1sarge1_s390.deb Size/MD5 checksum: 1418478 a3e2444094286bcb1da972e46c416cc2 Sun Sparc architecture: http://security.debian.org/pool/updates/main/k/kaffeine/kaffeine_0.6-1sarge1_sparc.deb Size/MD5 checksum: 1404282 f8e73e88d155a1873d64db720a6ae2d2 These files will probably be moved into the stable distribution on its next update. - --------------------------------------------------------------------------------- For apt-get: deb http://security.debian.org/ stable/updates main For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main Mailing list: debian-security-announce@lists.debian.org Package info: `apt-cache show ' and http://packages.debian.org/ -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.2.2 (GNU/Linux) iD8DBQFEM4paW5ql+IAeqTIRAlhwAJ97XJ8Cml4mqA7B0vVtfRzDyUm+HgCdEG5P 8sL/vZVYunJBelMO7JBleUo= =+LZX -----END PGP SIGNATURE----- _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/