Debian alert: New irssi-text packages fix denial of service
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - -------------------------------------------------------------------------- Debian Security Advisory DSA 157-1 security@debian.org http://www.debian.org/security/ Martin Schulze August 23rd, 2002 http://www.debian.org/security/faq - -------------------------------------------------------------------------- Package : irssi-text Vulnerability : denial of service Problem-Type : remote Debian-specific: no BugTraq ID : 5055 The IRC client irssi is vulnerable to a denial of service condition. The problem occurs when a user attempts to join a channel that has an overly long topic description. When a certain string is appended to the topic, irssi will crash. This problem has been fixed in version 0.8.4-3.1 for the current stable stable distribution (woody) and in version 0.8.5-2 for the unstable distribution (sid). The old stable distribution (potato) is not affected, since the corresponding portions of code are not present. The same applies to irssi-gnome and irssi-gtk, which don't seem to be affected as well. We recommend that you upgrade your irssi-text package. wget url will fetch the file for you dpkg -i file.deb will install the referenced file. If you are using the apt-get package manager, use the line for sources.list as given below: apt-get update will update the internal database apt-get upgrade will install corrected packages You may use an automated update by adding the resources from the footer to the proper configuration. Debian GNU/Linux 3.0 alias woody - -------------------------------- Source archives: http://security.debian.org/pool/updates/main/i/irssi-text/irssi-text_0.8.4-3.1.dsc Size/MD5 checksum: 649 45ddefa3d91a9b66c56160a5c017b2a7 http://security.debian.org/pool/updates/main/i/irssi-text/irssi-text_0.8.4-3.1.diff.gz Size/MD5 checksum: 72951 e31eed9f81003ba318e841f3fd5f5119 http://security.debian.org/pool/updates/main/i/irssi-text/irssi-text_0.8.4.orig.tar.gz Size/MD5 checksum: 952304 57bf9d89638be3d377be211f0b0d7049 Alpha architecture: http://security.debian.org/pool/updates/main/i/irssi-text/irssi-text_0.8.4-3.1_alpha.deb Size/MD5 checksum: 903334 1016a920949b3dd3a2a2ff0a5691a050 ARM architecture: http://security.debian.org/pool/updates/main/i/irssi-text/irssi-text_0.8.4-3.1_arm.deb Size/MD5 checksum: 754340 615076b56439436f3757dc48bc294233 Intel IA-32 architecture: http://security.debian.org/pool/updates/main/i/irssi-text/irssi-text_0.8.4-3.1_i386.deb Size/MD5 checksum: 695000 9557d0cce86def75e96636781c68716e Intel IA-64 architecture: http://security.debian.org/pool/updates/main/i/irssi-text/irssi-text_0.8.4-3.1_ia64.deb Size/MD5 checksum: 1291782 b5eaa3db75572cffdd490093ea99a1ec HP Precision architecture: http://security.debian.org/pool/updates/main/i/irssi-text/irssi-text_0.8.4-3.1_hppa.deb Size/MD5 checksum: 890694 9981ad90d84232736e152ff59f533048 Motorola 680x0 architecture: http://security.debian.org/pool/updates/main/i/irssi-text/irssi-text_0.8.4-3.1_m68k.deb Size/MD5 checksum: 683516 6bcafbf18d79d3113a2d2e15adbcc72e Big endian MIPS architecture: http://security.debian.org/pool/updates/main/i/irssi-text/irssi-text_0.8.4-3.1_mips.deb Size/MD5 checksum: 776628 a819f3ae3a7f6eb2b7de4935c50a92a2 Little endian MIPS architecture: http://security.debian.org/pool/updates/main/i/irssi-text/irssi-text_0.8.4-3.1_mipsel.deb Size/MD5 checksum: 776688 e6cbc3580de13997477cec0d4f4b6102 PowerPC architecture: http://security.debian.org/pool/updates/main/i/irssi-text/irssi-text_0.8.4-3.1_powerpc.deb Size/MD5 checksum: 760356 cb2027ac3fb685d5126b7d89e9c7bbbc IBM S/390 architecture: http://security.debian.org/pool/updates/main/i/irssi-text/irssi-text_0.8.4-3.1_s390.deb Size/MD5 checksum: 725678 3862d7d4ba5a3933507a976dd3855541 Sun Sparc architecture: http://security.debian.org/pool/updates/main/i/irssi-text/irssi-text_0.8.4-3.1_sparc.deb Size/MD5 checksum: 764396 527d18a16fa8f59bd0b950a758062527 These files will probably be moved into the stable distribution on its next revision. - --------------------------------------------------------------------------------- For apt-get: deb http://security.debian.org/ stable/updates main For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main Mailing list: debian-security-announce@lists.debian.org Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg> -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.0.7 (GNU/Linux) iD8DBQE9ZkCZW5ql+IAeqTIRAsYbAKCeIzSwNb1+Vsb4ve2Ok5CLcSouZwCfVp7E Ce1q/1KV0u6x3VV2Byxe1JI= =VPMk -----END PGP SIGNATURE----- |
|
This topic does not have any threads posted yet!
You cannot post until you login.