Jump to content

updated gaim packages


Recommended Posts

Mandrakesoft Security Advisories

 

Package name gaim

Date August 12th, 2004

Advisory ID MDKSA-2004:081

Affected versions 9.2, 10.0

Synopsis Updated gaim packages fix remotely exploitable vulnerabilities

 

 

Problem Description

 

Sebastian Krahmer discovered two remotely exploitable buffer overflow vulnerabilities in the gaim instant messenger. The updated packages are patched to correct the problems.

 

 

Updated Packages

 

 

Mandrakelinux 9.2

 

e98c583bb9c3943993fbd56c6a81919e 9.2/RPMS/gaim-0.75-1.4.92mdk.i586.rpm

11d435795713f8358ac35a3b41ef9a34 9.2/RPMS/gaim-encrypt-0.75-1.4.92mdk.i586.rpm

ef120aa0028475e83d9a517eaf621655 9.2/RPMS/gaim-festival-0.75-1.4.92mdk.i586.rpm

4ec686dec9501be0f64e4ae3819ffbb7 9.2/RPMS/gaim-perl-0.75-1.4.92mdk.i586.rpm

6a83e3edb461168b5dbe3302afd7613d 9.2/RPMS/libgaim-remote0-0.75-1.4.92mdk.i586.rpm

7363ae25ab1b9e505f8fc4bd87f5cb23 9.2/RPMS/libgaim-remote0-devel-0.75-1.4.92mdk.i586.rpm

d00e9aebb8e72bc383b7bf92738ba760 9.2/SRPMS/gaim-0.75-1.4.92mdk.src.rpm

 

Mandrakelinux 9.2/AMD64

 

dfee511b5d144d18b2cf68faa9a7b223 amd64/9.2/RPMS/gaim-0.75-1.4.92mdk.amd64.rpm

d3fe81c29663245a9f9bad8d60a3ac1a amd64/9.2/RPMS/gaim-encrypt-0.75-1.4.92mdk.amd64.rpm

267917ef901b303e8a310a7dc7e30f48 amd64/9.2/RPMS/gaim-festival-0.75-1.4.92mdk.amd64.rpm

100e0b60e07a1c3efc68a7020cff4be1 amd64/9.2/RPMS/gaim-perl-0.75-1.4.92mdk.amd64.rpm

46cb3c308880118d37c1a64cfbf35d41 amd64/9.2/RPMS/lib64gaim-remote0-0.75-1.4.92mdk.amd64.rpm

309b8b6fe13048051319848222223f28 amd64/9.2/RPMS/lib64gaim-remote0-devel-0.75-1.4.92mdk.amd64.rpm

d00e9aebb8e72bc383b7bf92738ba760 amd64/9.2/SRPMS/gaim-0.75-1.4.92mdk.src.rpm

 

Mandrakelinux 10.0

 

cd9dd302c9cf47474de3b68162e038d7 10.0/RPMS/gaim-0.75-5.2.100mdk.i586.rpm

e6e3b3ba3f58b754ba67c1df966fd2b5 10.0/RPMS/gaim-encrypt-0.75-5.2.100mdk.i586.rpm

065fc37af5a298e7d50e164ce3dda44a 10.0/RPMS/gaim-festival-0.75-5.2.100mdk.i586.rpm

b3f5a8d16d3d103087518aaa3e65f157 10.0/RPMS/gaim-perl-0.75-5.2.100mdk.i586.rpm

93226c0caef4ea3580056816fb1cf1c9 10.0/RPMS/libgaim-remote0-0.75-5.2.100mdk.i586.rpm

da6cf3c123ba4ba3847b4fda08fa0561 10.0/RPMS/libgaim-remote0-devel-0.75-5.2.100mdk.i586.rpm

56e190d0008657188b8faad013da92d6 10.0/SRPMS/gaim-0.75-5.2.100mdk.src.rpm

 

Mandrakelinux 10.0/AMD64

 

9be3eaff0c3562c758c8228d1dea00a1 amd64/10.0/RPMS/gaim-0.75-5.2.100mdk.amd64.rpm

e3074c7a9517e92cf78cca45f984a29f amd64/10.0/RPMS/gaim-encrypt-0.75-5.2.100mdk.amd64.rpm

f69b4c70daf8abb5bc6a75436e8291b7 amd64/10.0/RPMS/gaim-festival-0.75-5.2.100mdk.amd64.rpm

66964eaea125fc331631933b1d98c6a7 amd64/10.0/RPMS/gaim-perl-0.75-5.2.100mdk.amd64.rpm

9828f602d92f5c5b08e9a2077efcb765 amd64/10.0/RPMS/lib64gaim-remote0-0.75-5.2.100mdk.amd64.rpm

6c4a8298b328a4854c01010a7cca0bf2 amd64/10.0/RPMS/lib64gaim-remote0-devel-0.75-5.2.100mdk.amd64.rpm

56e190d0008657188b8faad013da92d6 amd64/10.0/SRPMS/gaim-0.75-5.2.100mdk.src.rpm

 

References

 

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0500

 

 

Upgrade

 

 

To upgrade automatically, use MandrakeUpdate.

 

Verification

 

 

Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command:

 

rpm --checksig package.rpm

 

 

You can get the GPG public key of the Mandrakelinux Security Team to verify the GPG signature of each RPM.

 

If you use MandrakeUpdate, the verification of md5 checksum and GPG signature is performed automatically for you.

Link to comment
Share on other sites

 Share

×
×
  • Create New...