delorie.com/archives/browse.cgi | search |
Mailing-List: | contact cygwin-help AT cygwin DOT com; run by ezmlm |
List-Subscribe: | <mailto:cygwin-subscribe AT cygwin DOT com> |
List-Archive: | <http://sources.redhat.com/ml/cygwin/> |
List-Post: | <mailto:cygwin AT cygwin DOT com> |
List-Help: | <mailto:cygwin-help AT cygwin DOT com>, <http://sources.redhat.com/ml/#faqs> |
Sender: | cygwin-owner AT cygwin DOT com |
Delivered-To: | mailing list cygwin AT cygwin DOT com |
Reply-To: | "Gary R Van Sickle" <tiberius AT braemarinc DOT com>, |
<g DOT r DOT vansickle AT worldnet DOT att DOT net> | |
From: | "Gary R. Van Sickle" <g DOT r DOT vansickle AT worldnet DOT att DOT net> |
To: | "Corinna Vinschen" <cygwin AT cygwin DOT com> |
Cc: | "Gary R Van Sickle" <tiberius AT braemarinc DOT com> |
Subject: | RE: [SECURITY] [DSA-096-1] mutt buffer overflow |
Date: | Thu, 3 Jan 2002 05:33:26 -0600 |
Message-ID: | <NCBBIHCHBLCMLBLOBONKOEDLCIAA.g.r.vansickle@worldnet.att.net> |
MIME-Version: | 1.0 |
X-Priority: | 3 (Normal) |
X-MSMail-Priority: | Normal |
X-Mailer: | Microsoft Outlook IMO, Build 9.0.2416 (9.0.2911.0) |
X-MimeOLE: | Produced By Microsoft MimeOLE V6.00.2600.0000 |
In-Reply-To: | <20020103121948.K27340@cygbert.vinschen.de> |
Importance: | Normal |
Oh Lord. Thanks for the heads up Corinna, I had not seen this. I'm not going to get a chance to reroll this until tomorrow evening; do you think this warrants pulling the current build from distribution? If so, by all means do so. I can write up an explanation/warning tomorrow and post it to the main list if you think that's warranted (I guess I do, even if you don't want to pull it). -- Gary R. Van Sickle Brewer. Patriot. > -----Original Message----- > From: cygwin-owner AT cygwin DOT com [mailto:cygwin-owner AT cygwin DOT com]On Behalf > Of Corinna Vinschen > Sent: Thursday, January 03, 2002 5:20 AM > To: cygwin > Subject: FW: [SECURITY] [DSA-096-1] mutt buffer overflow > > > -----Original Message----- > From: Wichert Akkerman [mailto:wichert AT wiggy DOT net] > Sent: Wednesday, January 02, 2002 6:39 PM > To: debian-security-announce AT lists DOT debian DOT org > Subject: [SECURITY] [DSA-096-1] mutt buffer overflow > > > -----BEGIN PGP SIGNED MESSAGE----- > > - > -------------------------------------------------------------- > ---------- > Debian Security Advisory DSA-096-1 > security AT debian DOT org > http://www.debian.org/security/ > Wichert Akkerman > January 2, 2002 > - > -------------------------------------------------------------- > ---------- > > > Package : mutt > Problem type : buffer overflow > Debian-specific: no > > Joost Pol found a buffer overflow in the address handling code of > mutt (a popular mail user agent). Even though this is a one byte > overflow this is exploitable. > > This has been fixed upstream in version 1.2.5.1 and 1.3.25. The > relevant patch has been added to version 1.2.5-5 of the Debian > package. > > wget url > will fetch the file for you > dpkg -i file.deb > will install the referenced file. > > > Debian GNU/Linux 2.2 alias potato > - --------------------------------- > > Potato was released for alpha, arm, i386, m68k, powerpc and sparc. > At this moment packages for sparc are not yet available. > > Source archives: > > http://security.debian.org/dists/stable/updates/main/source/mu > tt_1.2.5-5.diff.gz > MD5 checksum: 04f7c13c3bf6a1d4fcb4bf1a594522a1 > > http://security.debian.org/dists/stable/updates/main/source/mu > tt_1.2.5-5.dsc > MD5 checksum: 0ba73a6dd8029339329c27b56087ebce > > http://security.debian.org/dists/stable/updates/main/source/mu > tt_1.2.5.orig.tar.gz > MD5 checksum: 0ba5367059abdd55daceb82dce6be42f > > Alpha architecture: > > http://security.debian.org/dists/stable/updates/main/binary-al > pha/mutt_1.2.5-5_alpha.deb > MD5 checksum: b206557565607833551219ff67737cd4 > > ARM architecture: > > http://security.debian.org/dists/stable/updates/main/binary-ar > m/mutt_1.2.5-5_arm.deb > MD5 checksum: 57c0c2602c3bfde3f459f01515432eac > > Intel IA-32 architecture: > http://security.debian.org/dists/stable/updates/main/binary-i386/mutt_1.2.5-5_i3 86.deb MD5 checksum: d72fa58b0914762674648a68d410b4b9 Motorola 680x0 architecture: http://security.debian.org/dists/stable/updates/main/binary-m68k/mutt_1.2.5-5_m6 8k.deb MD5 checksum: 266c451cee06693e7f40917b0465981a PowerPC architecture: http://security.debian.org/dists/stable/updates/main/binary-powerpc/mutt_1.2.5-5 _powerpc.deb MD5 checksum: aec60dae6148ac9da29c111e70ea77b0 These packages will be moved into the stable distribution on its next revision. For not yet released architectures please refer to the appropriate directory ftp://ftp.debian.org/debian/dists/sid/binary-$arch/ . - -- - ---------------------------------------------------------------------------- apt-get: deb http://security.debian.org/ stable/updates main dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main Mailing list: debian-security-announce AT lists DOT debian DOT org -----BEGIN PGP SIGNATURE----- Version: 2.6.3ia Charset: noconv iQB1AwUBPDNFlajZR/ntlUftAQHLowMAlDOIzMX02myWrdk4h487ZxhPBK86i47O C8cDu9p4O4+39HkZNU+YNQs3+wZT5JaYnrBBiYryjDDqxXhzMDwbKYv534QuNZH9 t/1AsqUXp+veutwpWXuFT742TwsiCtW4 =xDVb -----END PGP SIGNATURE----- -- Unsubscribe info: http://cygwin.com/ml/#unsubscribe-simple Bug reporting: http://cygwin.com/bugs.html Documentation: http://cygwin.com/docs.html FAQ: http://cygwin.com/faq/ -- Unsubscribe info: http://cygwin.com/ml/#unsubscribe-simple Bug reporting: http://cygwin.com/bugs.html Documentation: http://cygwin.com/docs.html FAQ: http://cygwin.com/faq/
webmaster | delorie software privacy |
Copyright © 2019 by DJ Delorie | Updated Jul 2019 |