-----BEGIN PGP SIGNED MESSAGE----- Hash: RIPEMD160 Hi Thijs,
We don't currently have your signature on file. Could you please send it to us? Regards, - -- Jonathan Levine -- Information Security Analyst | Hotline: +61 7 3365 4417 AusCERT, Australia's National CERT | Fax: +61 7 3365 7031 The University of Queensland | WWW: www.auscert.org.au QLD 4072 Australia | Email: [email protected] > > -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA1 > > - ------------------------------------------------------------------------ > Debian Security Advisory DSA-1734-1 [email protected] > http://www.debian.org/security/ Thijs Kinkhorst > March 05, 2009 http://www.debian.org/security/faq > - ------------------------------------------------------------------------ > > Package : opensc > Vulnerability : programming error > Problem type : local > Debian-specific: no > CVE Id(s) : CVE-2009-0368 > > b.badrignans discovered that OpenSC, a set of smart card utilities, > could stores private data on a smart card without proper access > restrictions. > > Only blank cards initialised with OpenSC are affected by this problem. > This update only improves creating new private data objects, but cards > already initialised with such private data objects need to be > modified to repair the access control conditions on such cards. > Instructions for a variety of situations can be found at the OpenSC > web site: http://www.opensc-project.org/security.html > > The oldstable distribution (etch) is not affected by this problem. > > For the stable distribution (lenny), this problem has been fixed in > version 0.11.4-5+lenny1. > > For the unstable distribution (sid), this problem wil be fixed soon. > > We recommend that you upgrade your opensc package and recreate any > private data objects stored on your smart cards. > > Upgrade instructions > - -------------------- > > wget url > will fetch the file for you > dpkg -i file.deb > will install the referenced file. > > If you are using the apt-get package manager, use the line for > sources.list as given below: > > apt-get update > will update the internal database > apt-get upgrade > will install corrected packages > > You may use an automated update by adding the resources from the > footer to the proper configuration. > > > Debian GNU/Linux 5.0 alias lenny > - -------------------------------- > > Source archives: > > http://security.debian.org/pool/updates/main/o/opensc/opensc_0.11.4-5+lenny1.dsc > Size/MD5 checksum: 1333 a6a3c786d70bba230912db8550321b74 > http://security.debian.org/pool/updates/main/o/opensc/opensc_0.11.4-5+lenny1.dif f.gz > Size/MD5 checksum: 59733 5c19aa261ca11caeb9b46defe3a31754 > http://security.debian.org/pool/updates/main/o/opensc/opensc_0.11.4.orig.tar.gz > Size/MD5 checksum: 1410650 2031aa617be609d50d014d5d370bb8a2 > > alpha architecture (DEC Alpha) > > http://security.debian.org/pool/updates/main/o/opensc/mozilla-opensc_0.11.4-5+le nny1_alpha.deb > Size/MD5 checksum: 172210 4c13e02bdae7b31e03c07c77114ba7c5 > http://security.debian.org/pool/updates/main/o/opensc/libopensc2-dev_0.11.4-5+le nny1_alpha.deb > Size/MD5 checksum: 1425142 7de474eeba7f7c4d7c4ea720ce35a113 > http://security.debian.org/pool/updates/main/o/opensc/libopensc2_0.11.4-5+lenny1 _alpha.deb > Size/MD5 checksum: 617062 71bb9f5faf9dec5fb628f60d72a1f32c > http://security.debian.org/pool/updates/main/o/opensc/opensc_0.11.4-5+lenny1_alp ha.deb > Size/MD5 checksum: 395886 5f611a12bb340abcecd753ce9a0a9f7d > http://security.debian.org/pool/updates/main/o/opensc/libopensc2-dbg_0.11.4-5+le nny1_alpha.deb > Size/MD5 checksum: 1244884 e4fd99a2cdd5822eeb3c27200bdeabf4 > > amd64 architecture (AMD x86_64 (AMD64)) > > http://security.debian.org/pool/updates/main/o/opensc/mozilla-opensc_0.11.4-5+le nny1_amd64.deb > Size/MD5 checksum: 170424 797bf32516f3c8bf2784a40b3ea4b69b > http://security.debian.org/pool/updates/main/o/opensc/libopensc2_0.11.4-5+lenny1 _amd64.deb > Size/MD5 checksum: 600140 b426f75de39097f951edbb6beb267faf > http://security.debian.org/pool/updates/main/o/opensc/libopensc2-dev_0.11.4-5+le nny1_amd64.deb > Size/MD5 checksum: 1220570 9fac7d931102a13759ff27ca3e63886f > http://security.debian.org/pool/updates/main/o/opensc/libopensc2-dbg_0.11.4-5+le nny1_amd64.deb > Size/MD5 checksum: 1250976 348819662c1e6d0f856468f57f963bef > http://security.debian.org/pool/updates/main/o/opensc/opensc_0.11.4-5+lenny1_amd 64.deb > Size/MD5 checksum: 385876 e82572802a8f5297d4b231510d66a703 > > arm architecture (ARM) > > http://security.debian.org/pool/updates/main/o/opensc/libopensc2_0.11.4-5+lenny1 _arm.deb > Size/MD5 checksum: 553454 d2f2216d33649da2dedd0695f15df2bf > http://security.debian.org/pool/updates/main/o/opensc/mozilla-opensc_0.11.4-5+le nny1_arm.deb > Size/MD5 checksum: 164808 0a97588a633ef6fd02a7d8b7c42f75c9 > http://security.debian.org/pool/updates/main/o/opensc/libopensc2-dbg_0.11.4-5+le nny1_arm.deb > Size/MD5 checksum: 1192088 36f02f0adf21ff6681cb0fc82ed70bd0 > http://security.debian.org/pool/updates/main/o/opensc/opensc_0.11.4-5+lenny1_arm .deb > Size/MD5 checksum: 373220 4d994a576b5727bdd255977d0618ad4f > http://security.debian.org/pool/updates/main/o/opensc/libopensc2-dev_0.11.4-5+le nny1_arm.deb > Size/MD5 checksum: 1082568 27a17ba27333f92ec57c4610c9332eb2 > > armel architecture (ARM EABI) > > http://security.debian.org/pool/updates/main/o/opensc/libopensc2-dbg_0.11.4-5+le nny1_armel.deb > Size/MD5 checksum: 1194564 4be8b8833593141ec3e001165687a157 > http://security.debian.org/pool/updates/main/o/opensc/opensc_0.11.4-5+lenny1_arm el.deb > Size/MD5 checksum: 369484 b8de7da5f2f0b6d54db89f9e3a19d160 > http://security.debian.org/pool/updates/main/o/opensc/mozilla-opensc_0.11.4-5+le nny1_armel.deb > Size/MD5 checksum: 165046 9653c45b02a720ccdbb34856fd3a76b1 > http://security.debian.org/pool/updates/main/o/opensc/libopensc2_0.11.4-5+lenny1 _armel.deb > Size/MD5 checksum: 554712 b2773b917fa2e0bc309fd458c0fea985 > http://security.debian.org/pool/updates/main/o/opensc/libopensc2-dev_0.11.4-5+le nny1_armel.deb > Size/MD5 checksum: 1090686 475492b51137ee7a91601c179b077bf4 > > i386 architecture (Intel ia32) > > http://security.debian.org/pool/updates/main/o/opensc/libopensc2-dev_0.11.4-5+le nny1_i386.deb > Size/MD5 checksum: 1088224 11cb33b66522a8f90a4dffbb1c759cbe > http://security.debian.org/pool/updates/main/o/opensc/mozilla-opensc_0.11.4-5+le nny1_i386.deb > Size/MD5 checksum: 168202 46bb9b184aee6a8b8a8b585339baf872 > http://security.debian.org/pool/updates/main/o/opensc/opensc_0.11.4-5+lenny1_i38 6.deb > Size/MD5 checksum: 370748 1b61f2a6158c92d54209de0846604ed2 > http://security.debian.org/pool/updates/main/o/opensc/libopensc2-dbg_0.11.4-5+le nny1_i386.deb > Size/MD5 checksum: 1193874 8901246b5fd2aefd2160fd173090f19b > http://security.debian.org/pool/updates/main/o/opensc/libopensc2_0.11.4-5+lenny1 _i386.deb > Size/MD5 checksum: 552886 46c25a7402174e76930ffeb6f398f040 > > ia64 architecture (Intel ia64) > > http://security.debian.org/pool/updates/main/o/opensc/opensc_0.11.4-5+lenny1_ia6 4.deb > Size/MD5 checksum: 450212 553319b58affb12649c97fd1d37e8f8e > http://security.debian.org/pool/updates/main/o/opensc/libopensc2-dbg_0.11.4-5+le nny1_ia64.deb > Size/MD5 checksum: 1191394 17eb91686da2e1981c2915a6bd5bc584 > http://security.debian.org/pool/updates/main/o/opensc/mozilla-opensc_0.11.4-5+le nny1_ia64.deb > Size/MD5 checksum: 181174 837b37ae471abef686d1e4bbcae8e23d > http://security.debian.org/pool/updates/main/o/opensc/libopensc2_0.11.4-5+lenny1 _ia64.deb > Size/MD5 checksum: 764982 0da3fd6cbf96bd50c4be097b7db65648 > http://security.debian.org/pool/updates/main/o/opensc/libopensc2-dev_0.11.4-5+le nny1_ia64.deb > Size/MD5 checksum: 1468110 ad9ce50c292f3e7ece834e698906044c > > mips architecture (MIPS (Big Endian)) > > http://security.debian.org/pool/updates/main/o/opensc/libopensc2_0.11.4-5+lenny1 _mips.deb > Size/MD5 checksum: 552488 ec12157337de83c661021aee7125db85 > http://security.debian.org/pool/updates/main/o/opensc/mozilla-opensc_0.11.4-5+le nny1_mips.deb > Size/MD5 checksum: 166188 1eb9628b793ef050d1236cc9e4d4d532 > http://security.debian.org/pool/updates/main/o/opensc/libopensc2-dev_0.11.4-5+le nny1_mips.deb > Size/MD5 checksum: 1264080 684081bb05cb738cdf3e4b70b050565a > http://security.debian.org/pool/updates/main/o/opensc/opensc_0.11.4-5+lenny1_mip s.deb > Size/MD5 checksum: 377328 4968819d61a98db60aeb9bd5f07f49b1 > http://security.debian.org/pool/updates/main/o/opensc/libopensc2-dbg_0.11.4-5+le nny1_mips.deb > Size/MD5 checksum: 1254718 156a199d51fe78218b4538449b1d3900 > > mipsel architecture (MIPS (Little Endian)) > > http://security.debian.org/pool/updates/main/o/opensc/libopensc2_0.11.4-5+lenny1 _mipsel.deb > Size/MD5 checksum: 550368 3aa883498240d28dc669804f28fe80a9 > http://security.debian.org/pool/updates/main/o/opensc/opensc_0.11.4-5+lenny1_mip sel.deb > Size/MD5 checksum: 377668 cb0740488998e4f703c015260f209f85 > http://security.debian.org/pool/updates/main/o/opensc/libopensc2-dbg_0.11.4-5+le nny1_mipsel.deb > Size/MD5 checksum: 1235814 c61ddb25efc7625fece5c1f726ad5ed6 > http://security.debian.org/pool/updates/main/o/opensc/mozilla-opensc_0.11.4-5+le nny1_mipsel.deb > Size/MD5 checksum: 166032 f673d0d05f0acc00ef26ddab2b3ae018 > http://security.debian.org/pool/updates/main/o/opensc/libopensc2-dev_0.11.4-5+le nny1_mipsel.deb > Size/MD5 checksum: 1247014 01e37c41e5aff2e4e41a5a76cab2d746 > > powerpc architecture (PowerPC) > > http://security.debian.org/pool/updates/main/o/opensc/libopensc2-dev_0.11.4-5+le nny1_powerpc.deb > Size/MD5 checksum: 1281994 f6ff6e01ea9a89ff80dfa3988972a716 > http://security.debian.org/pool/updates/main/o/opensc/libopensc2-dbg_0.11.4-5+le nny1_powerpc.deb > Size/MD5 checksum: 1253656 53557381f96bfce43e16d4652e9d445b > http://security.debian.org/pool/updates/main/o/opensc/opensc_0.11.4-5+lenny1_pow erpc.deb > Size/MD5 checksum: 408656 d56d8d461f12cd491d373262eb1e6c07 > http://security.debian.org/pool/updates/main/o/opensc/mozilla-opensc_0.11.4-5+le nny1_powerpc.deb > Size/MD5 checksum: 171890 b5407ebd8e0b7b834ced0d23dc9060e8 > http://security.debian.org/pool/updates/main/o/opensc/libopensc2_0.11.4-5+lenny1 _powerpc.deb > Size/MD5 checksum: 597100 c73b0856c446c730cb4b7a7f9c51b3eb > > s390 architecture (IBM S/390) > > http://security.debian.org/pool/updates/main/o/opensc/libopensc2_0.11.4-5+lenny1 _s390.deb > Size/MD5 checksum: 594044 061ccf2f3690bae30a1493a9b1b54fcf > http://security.debian.org/pool/updates/main/o/opensc/mozilla-opensc_0.11.4-5+le nny1_s390.deb > Size/MD5 checksum: 171064 de877a46c93397604a33439eeb4da6c1 > http://security.debian.org/pool/updates/main/o/opensc/libopensc2-dbg_0.11.4-5+le nny1_s390.deb > Size/MD5 checksum: 1242074 42f645018b540f551573815813e2b014 > http://security.debian.org/pool/updates/main/o/opensc/libopensc2-dev_0.11.4-5+le nny1_s390.deb > Size/MD5 checksum: 1288032 57133c53afe7b50f517577fb3223ec80 > http://security.debian.org/pool/updates/main/o/opensc/opensc_0.11.4-5+lenny1_s39 0.deb > Size/MD5 checksum: 382574 7939fd08de0421d15f5c7a20ff935576 > > > These files will probably be moved into the stable distribution on > its next update. > > - - -------------------------------------------------------------------------------- - - > For apt-get: deb http://security.debian.org/ stable/updates main > For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main > Mailing list: [email protected] > Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg> > -----BEGIN PGP SIGNATURE----- > Version: GnuPG v1.4.9 (GNU/Linux) > > iQEcBAEBAgAGBQJJr4dhAAoJECIIoQCMVaAct04IAJMwLwCUCYzF97ERvt62ZP+d > qBo9P8ELC9alOoMSUA/KHNu0fE+Q4/wcejYUc647T6rdIIj20yoGXhhvhHlx5g8F > TYaDPHQN26JglEgsFfSN/BoAMFNQgHzzq/gsKfGLpqxMahESNLjiF/DfGftqgCD2 > ky4HGfFKCF+d7hH5+7R5WiEZ/6IFCZH89T8VCY1in9LvylbbWXhNpizpR33oHArk > ru9lYQp0l8KnifonxUNVXSMr5LwJXEl4mQ0+N7QUT5fHqcmOOcS7sAdmE6w8bzaW > VdBVh8XKFXsuvCZjp32cGdB1bHvUosd5Pf4F3cjMOB/P1EaSZkZK4F03ryTz5+Q= > =fIxQ > -----END PGP SIGNATURE----- > > > -- > To UNSUBSCRIBE, email to [email protected] > with a subject of "unsubscribe". Trouble? Contact [email protected] > -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iD8DBQFJsGaoNVH5XJJInbgRA3btAJ4gqnAyrp9yooJ/kLxpMkc9FquLCQCfR9zb TzKC+/LZ2V4bCjysnyb8wQk= =Gi2o -----END PGP SIGNATURE----- -- To UNSUBSCRIBE, email to [email protected] with a subject of "unsubscribe". Trouble? Contact [email protected]

