現在の Debian 安定版 (2.2 potato) のパッケージ man2html にセキュリティに関する深刻な問題が発見されました。 対処済みのパッケージに更新するには、 deb http://security.debian.org/ stable/updates main を /etc/apt/sources.list に追加し、 apt-get update ; apt-get upgrade を実行してください。 詳細については添付のアナウンスをご覧ください。
--- Begin Message ---
- From: Martin Schulze <joey@xxxxxxxxxxxxxxxxxxxxxxxxxxx>
- Subject: [SECURITY] [DSA 035-1] New version of man2html available
- Date: Wed, 7 Mar 2001 20:39:40 +0100
- Content-disposition: inline
- Priority: urgent
- Resent-date: Thu, 8 Mar 2001 04:47:24 +0900 (JST)
- Resent-from: debian-security-announce@lists.debian.org
- Resent-message-id: <YzeRoD.A.a3B.M6op6@murphy>
- Resent-sender: debian-security-announce-request@lists.debian.org
- X-debian: PGP check passed for security officers
- X-envelope-sender: joey@xxxxxxxxxxxxxxxxxxxxxxxxxxx
- X-loop: debian-security-announce@lists.debian.org
- X-mailing-list: <debian-security-announce@lists.debian.org> archive/latest/215
- Message-id: <20010307203940.A19952@xxxxxxxxxxxxxxxxxxxxxxxxxxx>
- User-agent: Mutt/1.3.12i
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - ---------------------------------------------------------------------------- Debian Security Advisory DSA-035-1 security@debian.org http://www.debian.org/security/ Martin Schulze March 7, 2001 - ---------------------------------------------------------------------------- Package : man2html Vulnerability : denial of service Type : remote DoS Debian-specific: no Fixed version : 1.5-22 and 1.5-23 It has been reported that one can tweak man2html remotely into consuming all available memory. This has been fixed by Nicol疽 Lichtmaier with help of Stephan Kulow. We recommend you upgrade your man2html package immediately. wget url will fetch the file for you dpkg -i file.deb will install the referenced file. You may use an automated update by adding the resources from the footer to the proper configuration. Debian GNU/Linux 2.2 alias potato - ------------------------------------ Potato was released for the alpha, arm, i386, m68k, powerpc and sparc architectures. Source archives: http://security.debian.org/dists/stable/updates/main/source/man2html_1.5.orig.tar.gz MD5 checksum: 2fc4ee65395122b5552473cd62876924 http://security.debian.org/dists/stable/updates/main/source/man2html_1.5-23.dsc MD5 checksum: b157e2207d5da25d71c74e64be46cd2f http://security.debian.org/dists/stable/updates/main/source/man2html_1.5-23.diff.gz MD5 checksum: 95081f3883dd7647227af148cf05da55 Intel ia32 architecture: http://security.debian.org/dists/stable/updates/main/binary-i386/man2html_1.5-23_i386.deb MD5 checksum: 706b70b961789cd15e32d1d7b53987e0 Motorola 680x0 architecture: http://security.debian.org/dists/stable/updates/main/binary-m68k/man2html_1.5-23_m68k.deb MD5 checksum: 74667dfc3f498c55f35d641f7f4dadbc Sun Sparc architecture: http://security.debian.org/dists/stable/updates/main/binary-sparc/man2html_1.5-23_sparc.deb MD5 checksum: 0a25f12fd8f594582b3eda82d492235b Alpha architecture: http://security.debian.org/dists/stable/updates/main/binary-alpha/man2html_1.5-23_alpha.deb MD5 checksum: 71cef3d676484426f8568a9ea38cb0a2 PowerPC architecture: http://security.debian.org/dists/stable/updates/main/binary-powerpc/man2html_1.5-23_powerpc.deb MD5 checksum: 225e85f974d32a65f432b70cb037cfb3 ARM architecture: http://security.debian.org/dists/stable/updates/main/binary-arm/man2html_1.5-23_arm.deb MD5 checksum: 758deb08ce747c0756a567aeeac3c977 These files will be moved into ftp://ftp.debian.org/debian/dists/stable/*/binary-$arch/ soon. For not yet released architectures please refer to the appropriate directory ftp://ftp.debian.org/debian/dists/sid/binary-$arch/ . - ---------------------------------------------------------------------------- For apt-get: deb http://security.debian.org/ stable/updates main For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main Mailing list: debian-security-announce@lists.debian.org Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg> -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.4 (GNU/Linux) Comment: For info see http://www.gnupg.org iD8DBQE6po0QW5ql+IAeqTIRAmg4AKCxMlO8ArE7l4GRqbD1CEvRTl+yzACfQYw+ CFO29hkbFYEU4orDdmr62Sk= =0D6F -----END PGP SIGNATURE----- -- To UNSUBSCRIBE, email to debian-security-announce-request@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org
--- End Message ---
Attachment:
pgpJc6sqmZBgQ.pgp
Description: PGP signature