Debian alert: OpenSSH buffer management fix
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - ------------------------------------------------------------------------ Debian Security Advisory DSA-383-1 security@debian.org http://www.debian.org/security/ Wichert Akkerman September 17, 2003 - ------------------------------------------------------------------------ Package : ssh-krb5 Vulnerability : buffer handling Problem type : possible remote Debian-specific: no CVS references : CAN-2003-0693 CAN-2003-0695 Several bugs have been found in OpenSSH's buffer handling. It is not known if these bugs are exploitable, but as a precaution an upgrade is advised. For the Debian stable distribution these bugs have been fixed in version 1:3.4p1-0woody3 . Upgrade Instructions - -------------------- wget url will fetch the file for you dpkg -i file.deb will install the referenced file. If you are using the apt-get package manager, use the line for sources.list as given below: apt-get update will update the internal database apt-get upgrade will install corrected packages You may use an automated update by adding the resources from the footer to the proper configuration. Debian GNU/Linux 3.0 alias woody - -------------------------------- Source archives: http://security.debian.org/pool/updates/main/o/openssh-krb5/openssh-krb5_3.4p1.orig.tar.gz Size/MD5 checksum: 837668 459c1d0262e939d6432f193c7a4ba8a8 http://security.debian.org/pool/updates/main/o/openssh-krb5/openssh-krb5_3.4p1-0woody3.diff.gz Size/MD5 checksum: 120256 101711fd74f01e6e670c334752cafe44 http://security.debian.org/pool/updates/main/o/openssh-krb5/openssh-krb5_3.4p1-0woody3.dsc Size/MD5 checksum: 822 e39ebe0e44ae1998d5c47ddb45d6dbe8 alpha architecture (DEC Alpha) http://security.debian.org/pool/updates/main/o/openssh-krb5/ssh-krb5_3.4p1-0woody3_alpha.deb Size/MD5 checksum: 888466 dd124b4ce632d30f00eed9409ea5b42a arm architecture (ARM) http://security.debian.org/pool/updates/main/o/openssh-krb5/ssh-krb5_3.4p1-0woody3_arm.deb Size/MD5 checksum: 687666 9cc220113aadc19c647fb65f5f0d998b hppa architecture (HP PA RISC) http://security.debian.org/pool/updates/main/o/openssh-krb5/ssh-krb5_3.4p1-0woody3_hppa.deb Size/MD5 checksum: 789256 a5bbdfbea796a3e2d6b979622466ab63 i386 architecture (Intel ia32) http://security.debian.org/pool/updates/main/o/openssh-krb5/ssh-krb5_3.4p1-0woody3_i386.deb Size/MD5 checksum: 671568 faa1fa7949a7cce9388057a485d98dc5 ia64 architecture (Intel ia64) http://security.debian.org/pool/updates/main/o/openssh-krb5/ssh-krb5_3.4p1-0woody3_ia64.deb Size/MD5 checksum: 1049956 51e568695ef150e6049e7b5b42d23891 mipsel architecture (MIPS (Little Endian)) http://security.debian.org/pool/updates/main/o/openssh-krb5/ssh-krb5_3.4p1-0woody3_mipsel.deb Size/MD5 checksum: 759494 0aeeb07fe815b8a0e36e5ded2763d1ab powerpc architecture (PowerPC) http://security.debian.org/pool/updates/main/o/openssh-krb5/ssh-krb5_3.4p1-0woody3_powerpc.deb Size/MD5 checksum: 711472 cf3efec05458df632179302cd78032f0 s390 architecture (IBM S/390) http://security.debian.org/pool/updates/main/o/openssh-krb5/ssh-krb5_3.4p1-0woody3_s390.deb Size/MD5 checksum: 749046 93cc4a83d9b3afded11ccc1a6a62d127 sparc architecture (Sun SPARC/UltraSPARC) http://security.debian.org/pool/updates/main/o/openssh-krb5/ssh-krb5_3.4p1-0woody3_sparc.deb Size/MD5 checksum: 694616 b56ebfa782eb8645e34058facd3e9ca5 - -- - ---------------------------------------------------------------------------- Debian Security team <team@security.debian.org> http://www.debian.org/security/ Mailing-List: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.2 (GNU/Linux) iD8DBQE/aICCPLiSUC+jvC0RAs8CAJ4ibM/vFpJQu+O6IHry1yx113uM+gCfSK/S JfZ0Fqf8SmCaOQJe0MkHr2c= =AtV1 -----END PGP SIGNATURE----- |
|
This topic does not have any threads posted yet!
You cannot post until you login.