[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: [SECURITY] [DSA 643-1] New queue packages fix buffer overflows



Same problem with evolution 2.0.3

On Tue, 2005-01-18 at 05:25 -0500, David wrote:
> Hello Martin,
> 
> Just wanted to let you know that the last two announcements you sent
> appear as blank messages in Thunderbrid with an unnamed attachment -
> perhaps due to the initial blank Content-Type: header.
> 
> David
> 
> On Tue, 18 Jan 2005, Martin Schulze wrote:
> 
> > -----BEGIN PGP SIGNED MESSAGE-----
> > Hash: SHA1
> >
> > - --------------------------------------------------------------------------
> > Debian Security Advisory DSA 643-1                     security@debian.org
> > http://www.debian.org/security/                             Martin Schulze
> > January 18th, 2005                      http://www.debian.org/security/faq
> > - --------------------------------------------------------------------------
> >
> > Package        : queue
> > Vulnerability  : buffer overflows
> > Problem-Type   : remote
> > Debian-specific: no
> > CVE ID         : CAN-2004-0555
> >
> > "jaguar" of the Debian Security Audit Project has discovered several
> > buffer overflows in queue, a transparent load balancing system.
> >
> > For the stable distribution (woody) these problems have been fixed in
> > version 1.30.1-4woody2.
> >
> > For the unstable distribution (sid) these problems have been fixed in
> > version 1.30.1-5.
> >
> > We recommend that you upgrade your queue package.
> >
> >
> > Upgrade Instructions
> > - --------------------
> >
> > wget url
> >         will fetch the file for you
> > dpkg -i file.deb
> >         will install the referenced file.
> >
> > If you are using the apt-get package manager, use the line for
> > sources.list as given below:
> >
> > apt-get update
> >         will update the internal database
> > apt-get upgrade
> >         will install corrected packages
> >
> > You may use an automated update by adding the resources from the
> > footer to the proper configuration.
> >
> >
> > Debian GNU/Linux 3.0 alias woody
> > - --------------------------------
> >
> >   Source archives:
> >
> >     http://security.debian.org/pool/updates/main/q/queue/queue_1.30.1-4woody2.dsc
> >       Size/MD5 checksum:      582 24c706e1af4baa9e8ac3dc02c8d72dce
> >     http://security.debian.org/pool/updates/main/q/queue/queue_1.30.1-4woody2.diff.gz
> >       Size/MD5 checksum:    42917 cb036472a17be964822cd1748dff9c5f
> >     http://security.debian.org/pool/updates/main/q/queue/queue_1.30.1.orig.tar.gz
> >       Size/MD5 checksum:   699770 82dd2a37f9c3d5f977afc0a990c9c648
> >
> >   Alpha architecture:
> >
> >     http://security.debian.org/pool/updates/main/q/queue/queue_1.30.1-4woody2_alpha.deb
> >       Size/MD5 checksum:   134242 cf2f009836139723d0b9eeccf6497e89
> >
> >   ARM architecture:
> >
> >     http://security.debian.org/pool/updates/main/q/queue/queue_1.30.1-4woody2_arm.deb
> >       Size/MD5 checksum:   112840 f2ee06cf9103664ae7dd631ff9cc5173
> >
> >   Intel IA-32 architecture:
> >
> >     http://security.debian.org/pool/updates/main/q/queue/queue_1.30.1-4woody2_i386.deb
> >       Size/MD5 checksum:   108874 777f71c6cf3136e7143094f9ba4507f7
> >
> >   Intel IA-64 architecture:
> >
> >     http://security.debian.org/pool/updates/main/q/queue/queue_1.30.1-4woody2_ia64.deb
> >       Size/MD5 checksum:   151766 caa6d74226f7ad6ebfbb50402b366693
> >
> >   HP Precision architecture:
> >
> >     http://security.debian.org/pool/updates/main/q/queue/queue_1.30.1-4woody2_hppa.deb
> >       Size/MD5 checksum:   116304 145964aa0dfd6fe42f6a67104af370a5
> >
> >   Motorola 680x0 architecture:
> >
> >     http://security.debian.org/pool/updates/main/q/queue/queue_1.30.1-4woody2_m68k.deb
> >       Size/MD5 checksum:   105868 d9035e0b49e56257444d1445b9f2b48a
> >
> >   Big endian MIPS architecture:
> >
> >     http://security.debian.org/pool/updates/main/q/queue/queue_1.30.1-4woody2_mips.deb
> >       Size/MD5 checksum:   117588 1d67e473d49dcfc3e6b8c083976ee22a
> >
> >   Little endian MIPS architecture:
> >
> >     http://security.debian.org/pool/updates/main/q/queue/queue_1.30.1-4woody2_mipsel.deb
> >       Size/MD5 checksum:   118012 721e4a42ae02098ff7acd6fbe60934c7
> >
> >   PowerPC architecture:
> >
> >     http://security.debian.org/pool/updates/main/q/queue/queue_1.30.1-4woody2_powerpc.deb
> >       Size/MD5 checksum:   112670 a294d33370973324ef46a8beaf20880a
> >
> >   IBM S/390 architecture:
> >
> >     http://security.debian.org/pool/updates/main/q/queue/queue_1.30.1-4woody2_s390.deb
> >       Size/MD5 checksum:   112492 799fe37a8371ab10c4fb78298b054b8e
> >
> >   Sun Sparc architecture:
> >
> >     http://security.debian.org/pool/updates/main/q/queue/queue_1.30.1-4woody2_sparc.deb
> >       Size/MD5 checksum:   123792 6a6685be2847e8c50c71712b80b05c2c
> >
> >
> >   These files will probably be moved into the stable distribution on
> >   its next update.
> >
> > - ---------------------------------------------------------------------------------
> > For apt-get: deb http://security.debian.org/ stable/updates main
> > For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
> > Mailing list: debian-security-announce@lists.debian.org
> > Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
> >
> > -----BEGIN PGP SIGNATURE-----
> > Version: GnuPG v1.2.5 (GNU/Linux)
> >
> > iD8DBQFB7MfgW5ql+IAeqTIRAk5gAKCiF4/BxJKCS9sO/unLnxk20Q/IkwCgp1pG
> > HTFfGLLM5sBKoRYUI5VqR3Y=
> > =LOOJ
> > -----END PGP SIGNATURE-----
> >
> >
> >
> 
> -- 
> |> /+\ \| | |>
> 
> David Croft
> Infotrek
> 
> 
-- 
Daniel van Eeden <daniel_e@dds.nl>

Attachment: smime.p7s
Description: S/MIME cryptographic signature


Reply to: