Same problem with evolution 2.0.3 On Tue, 2005-01-18 at 05:25 -0500, David wrote: > Hello Martin, > > Just wanted to let you know that the last two announcements you sent > appear as blank messages in Thunderbrid with an unnamed attachment - > perhaps due to the initial blank Content-Type: header. > > David > > On Tue, 18 Jan 2005, Martin Schulze wrote: > > > -----BEGIN PGP SIGNED MESSAGE----- > > Hash: SHA1 > > > > - -------------------------------------------------------------------------- > > Debian Security Advisory DSA 643-1 security@debian.org > > http://www.debian.org/security/ Martin Schulze > > January 18th, 2005 http://www.debian.org/security/faq > > - -------------------------------------------------------------------------- > > > > Package : queue > > Vulnerability : buffer overflows > > Problem-Type : remote > > Debian-specific: no > > CVE ID : CAN-2004-0555 > > > > "jaguar" of the Debian Security Audit Project has discovered several > > buffer overflows in queue, a transparent load balancing system. > > > > For the stable distribution (woody) these problems have been fixed in > > version 1.30.1-4woody2. > > > > For the unstable distribution (sid) these problems have been fixed in > > version 1.30.1-5. > > > > We recommend that you upgrade your queue package. > > > > > > Upgrade Instructions > > - -------------------- > > > > wget url > > will fetch the file for you > > dpkg -i file.deb > > will install the referenced file. > > > > If you are using the apt-get package manager, use the line for > > sources.list as given below: > > > > apt-get update > > will update the internal database > > apt-get upgrade > > will install corrected packages > > > > You may use an automated update by adding the resources from the > > footer to the proper configuration. > > > > > > Debian GNU/Linux 3.0 alias woody > > - -------------------------------- > > > > Source archives: > > > > http://security.debian.org/pool/updates/main/q/queue/queue_1.30.1-4woody2.dsc > > Size/MD5 checksum: 582 24c706e1af4baa9e8ac3dc02c8d72dce > > http://security.debian.org/pool/updates/main/q/queue/queue_1.30.1-4woody2.diff.gz > > Size/MD5 checksum: 42917 cb036472a17be964822cd1748dff9c5f > > http://security.debian.org/pool/updates/main/q/queue/queue_1.30.1.orig.tar.gz > > Size/MD5 checksum: 699770 82dd2a37f9c3d5f977afc0a990c9c648 > > > > Alpha architecture: > > > > http://security.debian.org/pool/updates/main/q/queue/queue_1.30.1-4woody2_alpha.deb > > Size/MD5 checksum: 134242 cf2f009836139723d0b9eeccf6497e89 > > > > ARM architecture: > > > > http://security.debian.org/pool/updates/main/q/queue/queue_1.30.1-4woody2_arm.deb > > Size/MD5 checksum: 112840 f2ee06cf9103664ae7dd631ff9cc5173 > > > > Intel IA-32 architecture: > > > > http://security.debian.org/pool/updates/main/q/queue/queue_1.30.1-4woody2_i386.deb > > Size/MD5 checksum: 108874 777f71c6cf3136e7143094f9ba4507f7 > > > > Intel IA-64 architecture: > > > > http://security.debian.org/pool/updates/main/q/queue/queue_1.30.1-4woody2_ia64.deb > > Size/MD5 checksum: 151766 caa6d74226f7ad6ebfbb50402b366693 > > > > HP Precision architecture: > > > > http://security.debian.org/pool/updates/main/q/queue/queue_1.30.1-4woody2_hppa.deb > > Size/MD5 checksum: 116304 145964aa0dfd6fe42f6a67104af370a5 > > > > Motorola 680x0 architecture: > > > > http://security.debian.org/pool/updates/main/q/queue/queue_1.30.1-4woody2_m68k.deb > > Size/MD5 checksum: 105868 d9035e0b49e56257444d1445b9f2b48a > > > > Big endian MIPS architecture: > > > > http://security.debian.org/pool/updates/main/q/queue/queue_1.30.1-4woody2_mips.deb > > Size/MD5 checksum: 117588 1d67e473d49dcfc3e6b8c083976ee22a > > > > Little endian MIPS architecture: > > > > http://security.debian.org/pool/updates/main/q/queue/queue_1.30.1-4woody2_mipsel.deb > > Size/MD5 checksum: 118012 721e4a42ae02098ff7acd6fbe60934c7 > > > > PowerPC architecture: > > > > http://security.debian.org/pool/updates/main/q/queue/queue_1.30.1-4woody2_powerpc.deb > > Size/MD5 checksum: 112670 a294d33370973324ef46a8beaf20880a > > > > IBM S/390 architecture: > > > > http://security.debian.org/pool/updates/main/q/queue/queue_1.30.1-4woody2_s390.deb > > Size/MD5 checksum: 112492 799fe37a8371ab10c4fb78298b054b8e > > > > Sun Sparc architecture: > > > > http://security.debian.org/pool/updates/main/q/queue/queue_1.30.1-4woody2_sparc.deb > > Size/MD5 checksum: 123792 6a6685be2847e8c50c71712b80b05c2c > > > > > > These files will probably be moved into the stable distribution on > > its next update. > > > > - --------------------------------------------------------------------------------- > > For apt-get: deb http://security.debian.org/ stable/updates main > > For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main > > Mailing list: debian-security-announce@lists.debian.org > > Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg> > > > > -----BEGIN PGP SIGNATURE----- > > Version: GnuPG v1.2.5 (GNU/Linux) > > > > iD8DBQFB7MfgW5ql+IAeqTIRAk5gAKCiF4/BxJKCS9sO/unLnxk20Q/IkwCgp1pG > > HTFfGLLM5sBKoRYUI5VqR3Y= > > =LOOJ > > -----END PGP SIGNATURE----- > > > > > > > > -- > |> /+\ \| | |> > > David Croft > Infotrek > > -- Daniel van Eeden <daniel_e@dds.nl>
Attachment:
smime.p7s
Description: S/MIME cryptographic signature