mystified Posted August 13, 2004 Report Share Posted August 13, 2004 Mandrakesoft Security Advisories Package name gaim Date August 12th, 2004 Advisory ID MDKSA-2004:081 Affected versions 9.2, 10.0 Synopsis Updated gaim packages fix remotely exploitable vulnerabilities Problem Description Sebastian Krahmer discovered two remotely exploitable buffer overflow vulnerabilities in the gaim instant messenger. The updated packages are patched to correct the problems. Updated Packages Mandrakelinux 9.2 e98c583bb9c3943993fbd56c6a81919e 9.2/RPMS/gaim-0.75-1.4.92mdk.i586.rpm 11d435795713f8358ac35a3b41ef9a34 9.2/RPMS/gaim-encrypt-0.75-1.4.92mdk.i586.rpm ef120aa0028475e83d9a517eaf621655 9.2/RPMS/gaim-festival-0.75-1.4.92mdk.i586.rpm 4ec686dec9501be0f64e4ae3819ffbb7 9.2/RPMS/gaim-perl-0.75-1.4.92mdk.i586.rpm 6a83e3edb461168b5dbe3302afd7613d 9.2/RPMS/libgaim-remote0-0.75-1.4.92mdk.i586.rpm 7363ae25ab1b9e505f8fc4bd87f5cb23 9.2/RPMS/libgaim-remote0-devel-0.75-1.4.92mdk.i586.rpm d00e9aebb8e72bc383b7bf92738ba760 9.2/SRPMS/gaim-0.75-1.4.92mdk.src.rpm Mandrakelinux 9.2/AMD64 dfee511b5d144d18b2cf68faa9a7b223 amd64/9.2/RPMS/gaim-0.75-1.4.92mdk.amd64.rpm d3fe81c29663245a9f9bad8d60a3ac1a amd64/9.2/RPMS/gaim-encrypt-0.75-1.4.92mdk.amd64.rpm 267917ef901b303e8a310a7dc7e30f48 amd64/9.2/RPMS/gaim-festival-0.75-1.4.92mdk.amd64.rpm 100e0b60e07a1c3efc68a7020cff4be1 amd64/9.2/RPMS/gaim-perl-0.75-1.4.92mdk.amd64.rpm 46cb3c308880118d37c1a64cfbf35d41 amd64/9.2/RPMS/lib64gaim-remote0-0.75-1.4.92mdk.amd64.rpm 309b8b6fe13048051319848222223f28 amd64/9.2/RPMS/lib64gaim-remote0-devel-0.75-1.4.92mdk.amd64.rpm d00e9aebb8e72bc383b7bf92738ba760 amd64/9.2/SRPMS/gaim-0.75-1.4.92mdk.src.rpm Mandrakelinux 10.0 cd9dd302c9cf47474de3b68162e038d7 10.0/RPMS/gaim-0.75-5.2.100mdk.i586.rpm e6e3b3ba3f58b754ba67c1df966fd2b5 10.0/RPMS/gaim-encrypt-0.75-5.2.100mdk.i586.rpm 065fc37af5a298e7d50e164ce3dda44a 10.0/RPMS/gaim-festival-0.75-5.2.100mdk.i586.rpm b3f5a8d16d3d103087518aaa3e65f157 10.0/RPMS/gaim-perl-0.75-5.2.100mdk.i586.rpm 93226c0caef4ea3580056816fb1cf1c9 10.0/RPMS/libgaim-remote0-0.75-5.2.100mdk.i586.rpm da6cf3c123ba4ba3847b4fda08fa0561 10.0/RPMS/libgaim-remote0-devel-0.75-5.2.100mdk.i586.rpm 56e190d0008657188b8faad013da92d6 10.0/SRPMS/gaim-0.75-5.2.100mdk.src.rpm Mandrakelinux 10.0/AMD64 9be3eaff0c3562c758c8228d1dea00a1 amd64/10.0/RPMS/gaim-0.75-5.2.100mdk.amd64.rpm e3074c7a9517e92cf78cca45f984a29f amd64/10.0/RPMS/gaim-encrypt-0.75-5.2.100mdk.amd64.rpm f69b4c70daf8abb5bc6a75436e8291b7 amd64/10.0/RPMS/gaim-festival-0.75-5.2.100mdk.amd64.rpm 66964eaea125fc331631933b1d98c6a7 amd64/10.0/RPMS/gaim-perl-0.75-5.2.100mdk.amd64.rpm 9828f602d92f5c5b08e9a2077efcb765 amd64/10.0/RPMS/lib64gaim-remote0-0.75-5.2.100mdk.amd64.rpm 6c4a8298b328a4854c01010a7cca0bf2 amd64/10.0/RPMS/lib64gaim-remote0-devel-0.75-5.2.100mdk.amd64.rpm 56e190d0008657188b8faad013da92d6 amd64/10.0/SRPMS/gaim-0.75-5.2.100mdk.src.rpm References http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0500 Upgrade To upgrade automatically, use MandrakeUpdate. Verification Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command: rpm --checksig package.rpm You can get the GPG public key of the Mandrakelinux Security Team to verify the GPG signature of each RPM. If you use MandrakeUpdate, the verification of md5 checksum and GPG signature is performed automatically for you. Link to comment Share on other sites More sharing options...
Recommended Posts