drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Pufferüberläufe in centerim
Name: |
Pufferüberläufe in centerim |
|
ID: |
DTSA-55-1 |
|
Distribution: |
Debian Testing |
|
Plattformen: |
Debian testing |
|
Datum: |
Sa, 1. September 2007, 06:37 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3713 |
|
Applikationen: |
Centerim |
|
Originalnachricht |
--===============0019564293954161746== Content-Type: multipart/signed; boundary="nextPart2675018.zZIl9j4hef"; protocol="application/pgp-signature"; micalg=pgp-sha1 Content-Transfer-Encoding: 7bit
--nextPart2675018.zZIl9j4hef Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable Content-Disposition: inline
=2D -----------------------------------------------------------------------= =2D-- Debian Testing Security Advisory DTSA-55-1 September 1st , 2= 007 secure-testing-team at lists.alioth.debian.org Steffen Joer= is http://secure-testing-master.debian.net/ =2D -----------------------------------------------------------------------= =2D--
Package : centerim Vulnerability : buffer overflows Problem-Scope : remote Debian-specific: no CVE ID : CVE-2007-3713
It was discovered that there are multiple buffer overflows, which could lea= d=20 to the execution of arbitrary code.
=46or the testing distribution (lenny) this is fixed in version 4.22.1-2lenny1
=46or the unstable distribution (sid) this is fixed in version 4.22.1-2.1
This upgrade is recommended if you use centerim (centerim-common, centerim, centerim-utf8, centerim-fribidi, centericq,=20 centericq-utf8, centericq-fribidi)
Upgrade Instructions =2D --------------------
To use the Debian testing security archive, add the following lines to your /etc/apt/sources.list:
deb http://security.debian.org/ testing/updates main contrib non-free deb-src http://security.debian.org/ testing/updates main contrib non-free
To install the update, run this command as root:
apt-get update && apt-get upgrade
=46or further information about the Debian testing security team, please re= fer to http://secure-testing-master.debian.net/
--nextPart2675018.zZIl9j4hef Content-Type: application/pgp-signature; name=signature.asc Content-Description: This is a digitally signed message part.
-----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.6 (GNU/Linux)
iD8DBQBG2Oyb62zWxYk/rQcRAkphAKC2ZV3SbDedphf1wYYpD3QAdP1FlwCcCvuw z2EwP7GRStk0V0sHBPkdCcM= =k3J0 -----END PGP SIGNATURE-----
--nextPart2675018.zZIl9j4hef--
--===============0019564293954161746== Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline
_______________________________________________ secure-testing-announce mailing list secure-testing-announce@lists.alioth.debian.org http://lists.alioth.debian.org/mailman/listinfo/secure-testing-announce --===============0019564293954161746==--
|
|
|
|