DSA-1570-1 kazehakase -- various

Related Vulnerabilities: CVE-2006-7227   CVE-2006-7228   CVE-2006-7230   CVE-2007-1659   CVE-2007-1660   CVE-2007-1661   CVE-2007-1662   CVE-2007-4766   CVE-2007-4767   CVE-2007-4768  

Andrews Salomon reported that kazehakase, a GTK+-based web browser that allows pluggable rendering engines, contained an embedded copy of the PCRE library in its source tree which was compiled in and used in preference to the system-wide version of this library. The PCRE library has been updated to fix the security issues reported against it in previous Debian Security Advisories. This update ensures that kazehakase uses that supported library, and not its own embedded and insecure version. For the stable distribution (etch), this problem has been fixed in version 0.4.2-1etch1. We recommend that you upgrade your kazehakase package.

Debian Security Advisory

DSA-1570-1 kazehakase -- various

Date Reported:
06 May 2008
Affected Packages:
kazehakase
Vulnerable:
Yes
Security database references:
In the Debian bugtracking system: Bug 464756.
In Mitre's CVE dictionary: CVE-2006-7227, CVE-2006-7228, CVE-2006-7230, CVE-2007-1659, CVE-2007-1660, CVE-2007-1661, CVE-2007-1662, CVE-2007-4766, CVE-2007-4767, CVE-2007-4768.
More information:

Andrews Salomon reported that kazehakase, a GTK+-based web browser that allows pluggable rendering engines, contained an embedded copy of the PCRE library in its source tree which was compiled in and used in preference to the system-wide version of this library.

The PCRE library has been updated to fix the security issues reported against it in previous Debian Security Advisories. This update ensures that kazehakase uses that supported library, and not its own embedded and insecure version.

For the stable distribution (etch), this problem has been fixed in version 0.4.2-1etch4.

We recommend that you upgrade your kazehakase package.

Fixed in:

Debian GNU/Linux 4.0 (etch)

Source:
http://security.debian.org/pool/updates/main/k/kazehakase/kazehakase_0.4.2-1etch4.diff.gz
http://security.debian.org/pool/updates/main/k/kazehakase/kazehakase_0.4.2.orig.tar.gz
http://security.debian.org/pool/updates/main/k/kazehakase/kazehakase_0.4.2-1etch4.dsc
Alpha:
http://security.debian.org/pool/updates/main/k/kazehakase/kazehakase_0.4.2-1etch4_alpha.deb
AMD64:
http://security.debian.org/pool/updates/main/k/kazehakase/kazehakase_0.4.2-1etch4_amd64.deb
ARM:
http://security.debian.org/pool/updates/main/k/kazehakase/kazehakase_0.4.2-1etch4_arm.deb
HP Precision:
http://security.debian.org/pool/updates/main/k/kazehakase/kazehakase_0.4.2-1etch4_hppa.deb
Intel IA-32:
http://security.debian.org/pool/updates/main/k/kazehakase/kazehakase_0.4.2-1etch4_i386.deb
Big-endian MIPS:
http://security.debian.org/pool/updates/main/k/kazehakase/kazehakase_0.4.2-1etch4_mips.deb
Little-endian MIPS:
http://security.debian.org/pool/updates/main/k/kazehakase/kazehakase_0.4.2-1etch4_mipsel.deb
PowerPC:
http://security.debian.org/pool/updates/main/k/kazehakase/kazehakase_0.4.2-1etch4_powerpc.deb
IBM S/390:
http://security.debian.org/pool/updates/main/k/kazehakase/kazehakase_0.4.2-1etch4_s390.deb
Sun Sparc:
http://security.debian.org/pool/updates/main/k/kazehakase/kazehakase_0.4.2-1etch4_sparc.deb

MD5 checksums of the listed files are available in the original advisory.