drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Pufferüberlauf in mutt
Name: |
Pufferüberlauf in mutt
|
|
ID: |
DSA-096-1 |
|
Distribution: |
Debian |
|
Plattformen: |
Debian potato |
|
Datum: |
Do, 3. Januar 2002, 12:00 |
|
Referenzen: |
Keine Angabe |
|
Applikationen: |
mutt |
|
Originalnachricht |
-----BEGIN PGP SIGNED MESSAGE-----
------------------------------------------------------------------------ Debian Security Advisory DSA-096-1 security@debian.org http://www.debian.org/security/ Wichert Akkerman January 2, 2002 ------------------------------------------------------------------------
Package : mutt Problem type : buffer overflow Debian-specific: no
Joost Pol found a buffer overflow in the address handling code of mutt (a popular mail user agent). Even though this is a one byte overflow this is exploitable.
This has been fixed upstream in version 1.2.5.1 and 1.3.25. The relevant patch has been added to version 1.2.5-5 of the Debian package.
wget url will fetch the file for you dpkg -i file.deb will install the referenced file.
Debian GNU/Linux 2.2 alias potato ---------------------------------
Potato was released for alpha, arm, i386, m68k, powerpc and sparc. At this moment packages for sparc are not yet available.
Source archives: mutt_1.2.5-5.diff.gz MD5 checksum: 04f7c13c3bf6a1d4fcb4bf1a594522a1 mutt_1.2.5-5.dsc MD5 checksum: 0ba73a6dd8029339329c27b56087ebce mutt_1.2.5.orig.tar.gz MD5 checksum: 0ba5367059abdd55daceb82dce6be42f
Alpha architecture: mutt_1.2.5-5_alpha.deb MD5 checksum: b206557565607833551219ff67737cd4
ARM architecture: mutt_1.2.5-5_arm.deb MD5 checksum: 57c0c2602c3bfde3f459f01515432eac
Intel IA-32 architecture: mutt_1.2.5-5_i386.deb MD5 checksum: d72fa58b0914762674648a68d410b4b9
Motorola 680x0 architecture: mutt_1.2.5-5_m68k.deb MD5 checksum: 266c451cee06693e7f40917b0465981a
PowerPC architecture: mutt_1.2.5-5_powerpc.deb MD5 checksum: aec60dae6148ac9da29c111e70ea77b0
These packages will be moved into the stable distribution on its next revision.
For not yet released architectures please refer to the appropriate directory ftp://ftp.debian.org/debian/dists/sid/binary-$arch/ .
-- ---------------------------------------------------------------------------- apt-get: deb http://security.debian.org/ stable/updates main dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE----- Version: 2.6.3ia Charset: noconv
iQB1AwUBPDNFlajZR/ntlUftAQHLowMAlDOIzMX02myWrdk4h487ZxhPBK86i47O C8cDu9p4O4+39HkZNU+YNQs3+wZT5JaYnrBBiYryjDDqxXhzMDwbKYv534QuNZH9 t/1AsqUXp+veutwpWXuFT742TwsiCtW4 =xDVb -----END PGP SIGNATURE-----
-- To UNSUBSCRIBE, email to debian-security-announce-request@lists.debian.org with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org
|
|
|
|