現在の Debian 安定版 (2.2 potato) にセキュリティに関する深刻な問題が発見 されました。 対象パッケージ: slrn 対処済みのパッケージに更新するには、 deb http://security.debian.org/ stable/updates main を /etc/apt/sources.list に追加し、 apt-get update ; apt-get upgrade を実行してください。 詳細については添付のアナウンスをご覧ください。
--- Begin Message ---
- From: Wichert Akkerman <wichert@xxxxxxxxxx>
- Subject: [SECURITY] [DSA-040-1] slrn buffer overflow
- Date: Fri, 9 Mar 2001 01:53:20 +0100
- Priority: urgent
- Resent-date: Fri, 9 Mar 2001 09:59:21 +0900 (JST)
- Resent-from: debian-security-announce@lists.debian.org
- Resent-message-id: <nepuCC.A.BMD.6nCq6@murphy>
- Resent-sender: debian-security-announce-request@lists.debian.org
- X-debian: PGP check passed for security officers
- X-envelope-sender: wichert@xxxxxxxxxx
- X-loop: debian-security-announce@lists.debian.org
- X-mailing-list: <debian-security-announce@lists.debian.org> archive/latest/221
- Message-id: <200103090053.f290rKl27855@xxxxxxxxxxxxxxxxxx>
-----BEGIN PGP SIGNED MESSAGE----- - ------------------------------------------------------------------------ Debian Security Advisory DSA-040-1 security@debian.org http://www.debian.org/security/ Wichert Akkerman March 9, 2001 - ------------------------------------------------------------------------ Package : slrn Problem type : buffer overflow Debian-specific: no Bill Nottingham reported a problem in the wrapping/unwrapping functions of the slrn newsreader. A long header in a message might overflow a buffer and which could result into executing arbitraty code encoded in the message. The default configuration does not have wrapping enable, but it can easily be enabled either by changing the configuration or pressing W while viewing a message. This has been fixed in version 0.9.6.2-9potato1 and we recommand that you upgrade your slrn package immediately. wget url will fetch the file for you dpkg -i file.deb will install the referenced file. Debian GNU/Linux 2.2 alias potato - --------------------------------- Potato was released for alpha, arm, i386, m68k, powerpc and sparc. Source archives: http://security.debian.org/dists/stable/updates/main/source/slrn_0.9.6.2-9potato1.diff.gz MD5 checksum: 5dd13f483c2fa61d6fd6370f7813df82 http://security.debian.org/dists/stable/updates/main/source/slrn_0.9.6.2-9potato1.dsc MD5 checksum: 813ad9482041914b484428281fc28ad8 http://security.debian.org/dists/stable/updates/main/source/slrn_0.9.6.2.orig.tar.gz MD5 checksum: 7ce442af03aeafb88a636183955c270e Alpha architecture: http://security.debian.org/dists/stable/updates/main/binary-alpha/slrn_0.9.6.2-9potato1_alpha.deb MD5 checksum: 8329209a6aa996d1ae6d661f56dd3188 http://security.debian.org/dists/stable/updates/main/binary-alpha/slrnpull_0.9.6.2-9potato1_alpha.deb MD5 checksum: 91cd53de5c2c8cd58fecbec3c703156b ARM architecture: http://security.debian.org/dists/stable/updates/main/binary-arm/slrn_0.9.6.2-9potato1_arm.deb MD5 checksum: 25e04bc0fbf2f7d6f04005c2ecb4831d http://security.debian.org/dists/stable/updates/main/binary-arm/slrnpull_0.9.6.2-9potato1_arm.deb MD5 checksum: eef5b32a35d8193cfbe7988f683f70bf Intel ia32 architecture: http://security.debian.org/dists/stable/updates/main/binary-i386/slrn_0.9.6.2-9potato1_i386.deb MD5 checksum: c871721245934e479a70fc712fa24021 http://security.debian.org/dists/stable/updates/main/binary-i386/slrnpull_0.9.6.2-9potato1_i386.deb MD5 checksum: 2e8c43ac86e3a28ca5c65f40c47315d8 Motorola 680x0 architecture: http://security.debian.org/dists/stable/updates/main/binary-m68k/slrn_0.9.6.2-9potato1_m68k.deb MD5 checksum: a30edb247ac6bed594a848421588e8bb http://security.debian.org/dists/stable/updates/main/binary-m68k/slrnpull_0.9.6.2-9potato1_m68k.deb MD5 checksum: 7aeeca1532ef2d384d98990aa51c5bc8 PowerPC architecture: http://security.debian.org/dists/stable/updates/main/binary-powerpc/slrn_0.9.6.2-9potato1_powerpc.deb MD5 checksum: f7fdde7f8a5028812fb5d06779c0fb63 http://security.debian.org/dists/stable/updates/main/binary-powerpc/slrnpull_0.9.6.2-9potato1_powerpc.deb MD5 checksum: 74a4648cdcfaf38243f7654a9b496832 Sun Sparc architecture: http://security.debian.org/dists/stable/updates/main/binary-sparc/slrn_0.9.6.2-9potato1_sparc.deb MD5 checksum: ac9f606cf5524dd1865e7b85314e7a3a http://security.debian.org/dists/stable/updates/main/binary-sparc/slrnpull_0.9.6.2-9potato1_sparc.deb MD5 checksum: 7b912bd3e7d406be4e041bea90d77439 These files will be moved into ftp://ftp.debian.org/debian/dists/stable/*/binary-$arch/ soon. For not yet released architectures please refer to the appropriate directory ftp://ftp.debian.org/debian/dists/sid/binary-$arch/ . - -- - ---------------------------------------------------------------------------- apt-get: deb http://security.debian.org/ stable/updates main dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- Version: 2.6.3ia Charset: noconv iQB1AwUBOqgpeqjZR/ntlUftAQGICgL9E4gRCsUTvfxZwbYB8L0d0ALhud9BeGzS UXgCiMZiyVG45GVH7dInAAYv54dkhJj4SXumNK7qWEjtvAuYVOT/ekfT3pwj9l24 s6WtjlFupHgWdaUR0fSldlvXlUV9snbV =aIHJ -----END PGP SIGNATURE----- -- To UNSUBSCRIBE, email to debian-security-announce-request@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org
--- End Message ---
Attachment:
pgp4EPGN5lefC.pgp
Description: PGP signature