Bulletin d'alerte Debian
DSA-1129-1 osiris -- Chaîne de formatage
- Date du rapport :
- 28 juillet 2006
- Paquets concernés :
- osiris
- Vulnérabilité :
- Oui
- Références dans la base de données de sécurité :
- Dans le dictionnaire CVE du Mitre : CVE-2006-3120.
- Plus de précisions :
-
Ulf Härnhammar et Max Vozeler, du projet d'audit de sécurité de Debian, ont découvert plusieurs bogues de sécurité liés aux chaînes de formatage dans osiris, une interface de contrôle et de surveillance de l'intégrité des systèmes présents sur l'ensemble d'un réseau. Un attaquant distant pouvait les exploiter pour provoquer un déni de service ou exécuter du code arbitraire.
Pour l'actuelle distribution stable (Sarge), ces problèmes ont été corrigés dans la version 4.0.6-1sarge1.
Pour la distribution instable (Sid), ces problèmes ont été corrigés dans la version 4.2.0-2.
Nous vous recommandons de mettre à jour vos paquets osiris.
- Corrigé dans :
-
Debian GNU/Linux 3.1 (sarge)
- Source :
- http://security.debian.org/pool/updates/main/o/osiris/osiris_4.0.6-1sarge1.dsc
- http://security.debian.org/pool/updates/main/o/osiris/osiris_4.0.6-1sarge1.diff.gz
- http://security.debian.org/pool/updates/main/o/osiris/osiris_4.0.6.orig.tar.gz
- http://security.debian.org/pool/updates/main/o/osiris/osiris_4.0.6-1sarge1.diff.gz
- Alpha:
- http://security.debian.org/pool/updates/main/o/osiris/osiris_4.0.6-1sarge1_alpha.deb
- http://security.debian.org/pool/updates/main/o/osiris/osirisd_4.0.6-1sarge1_alpha.deb
- http://security.debian.org/pool/updates/main/o/osiris/osirismd_4.0.6-1sarge1_alpha.deb
- http://security.debian.org/pool/updates/main/o/osiris/osirisd_4.0.6-1sarge1_alpha.deb
- AMD64:
- http://security.debian.org/pool/updates/main/o/osiris/osiris_4.0.6-1sarge1_amd64.deb
- http://security.debian.org/pool/updates/main/o/osiris/osirisd_4.0.6-1sarge1_amd64.deb
- http://security.debian.org/pool/updates/main/o/osiris/osirismd_4.0.6-1sarge1_amd64.deb
- http://security.debian.org/pool/updates/main/o/osiris/osirisd_4.0.6-1sarge1_amd64.deb
- ARM:
- http://security.debian.org/pool/updates/main/o/osiris/osiris_4.0.6-1sarge1_arm.deb
- http://security.debian.org/pool/updates/main/o/osiris/osirisd_4.0.6-1sarge1_arm.deb
- http://security.debian.org/pool/updates/main/o/osiris/osirismd_4.0.6-1sarge1_arm.deb
- http://security.debian.org/pool/updates/main/o/osiris/osirisd_4.0.6-1sarge1_arm.deb
- Intel IA-32:
- http://security.debian.org/pool/updates/main/o/osiris/osiris_4.0.6-1sarge1_i386.deb
- http://security.debian.org/pool/updates/main/o/osiris/osirisd_4.0.6-1sarge1_i386.deb
- http://security.debian.org/pool/updates/main/o/osiris/osirismd_4.0.6-1sarge1_i386.deb
- http://security.debian.org/pool/updates/main/o/osiris/osirisd_4.0.6-1sarge1_i386.deb
- Intel IA-64:
- http://security.debian.org/pool/updates/main/o/osiris/osiris_4.0.6-1sarge1_ia64.deb
- http://security.debian.org/pool/updates/main/o/osiris/osirisd_4.0.6-1sarge1_ia64.deb
- http://security.debian.org/pool/updates/main/o/osiris/osirismd_4.0.6-1sarge1_ia64.deb
- http://security.debian.org/pool/updates/main/o/osiris/osirisd_4.0.6-1sarge1_ia64.deb
- HPPA:
- http://security.debian.org/pool/updates/main/o/osiris/osiris_4.0.6-1sarge1_hppa.deb
- http://security.debian.org/pool/updates/main/o/osiris/osirisd_4.0.6-1sarge1_hppa.deb
- http://security.debian.org/pool/updates/main/o/osiris/osirismd_4.0.6-1sarge1_hppa.deb
- http://security.debian.org/pool/updates/main/o/osiris/osirisd_4.0.6-1sarge1_hppa.deb
- Motorola 680x0:
- http://security.debian.org/pool/updates/main/o/osiris/osiris_4.0.6-1sarge1_m68k.deb
- http://security.debian.org/pool/updates/main/o/osiris/osirisd_4.0.6-1sarge1_m68k.deb
- http://security.debian.org/pool/updates/main/o/osiris/osirismd_4.0.6-1sarge1_m68k.deb
- http://security.debian.org/pool/updates/main/o/osiris/osirisd_4.0.6-1sarge1_m68k.deb
- Big endian MIPS:
- http://security.debian.org/pool/updates/main/o/osiris/osiris_4.0.6-1sarge1_mips.deb
- http://security.debian.org/pool/updates/main/o/osiris/osirisd_4.0.6-1sarge1_mips.deb
- http://security.debian.org/pool/updates/main/o/osiris/osirismd_4.0.6-1sarge1_mips.deb
- http://security.debian.org/pool/updates/main/o/osiris/osirisd_4.0.6-1sarge1_mips.deb
- Little endian MIPS:
- http://security.debian.org/pool/updates/main/o/osiris/osiris_4.0.6-1sarge1_mipsel.deb
- http://security.debian.org/pool/updates/main/o/osiris/osirisd_4.0.6-1sarge1_mipsel.deb
- http://security.debian.org/pool/updates/main/o/osiris/osirismd_4.0.6-1sarge1_mipsel.deb
- http://security.debian.org/pool/updates/main/o/osiris/osirisd_4.0.6-1sarge1_mipsel.deb
- PowerPC:
- http://security.debian.org/pool/updates/main/o/osiris/osiris_4.0.6-1sarge1_powerpc.deb
- http://security.debian.org/pool/updates/main/o/osiris/osirisd_4.0.6-1sarge1_powerpc.deb
- http://security.debian.org/pool/updates/main/o/osiris/osirismd_4.0.6-1sarge1_powerpc.deb
- http://security.debian.org/pool/updates/main/o/osiris/osirisd_4.0.6-1sarge1_powerpc.deb
- IBM S/390:
- http://security.debian.org/pool/updates/main/o/osiris/osiris_4.0.6-1sarge1_s390.deb
- http://security.debian.org/pool/updates/main/o/osiris/osirisd_4.0.6-1sarge1_s390.deb
- http://security.debian.org/pool/updates/main/o/osiris/osirismd_4.0.6-1sarge1_s390.deb
- http://security.debian.org/pool/updates/main/o/osiris/osirisd_4.0.6-1sarge1_s390.deb
- Sun Sparc:
- http://security.debian.org/pool/updates/main/o/osiris/osiris_4.0.6-1sarge1_sparc.deb
- http://security.debian.org/pool/updates/main/o/osiris/osirisd_4.0.6-1sarge1_sparc.deb
- http://security.debian.org/pool/updates/main/o/osiris/osirismd_4.0.6-1sarge1_sparc.deb
- http://security.debian.org/pool/updates/main/o/osiris/osirisd_4.0.6-1sarge1_sparc.deb
Les sommes MD5 des fichiers indiqués sont disponibles sur la page originale de l'alerte de sécurité.