>From the Debian security mailing list, Wichert Akkerman writes: Security hole found in junkbuster program. Nov 12th, 04:23:15 We have received reports that junkbuster had a couple buffer overflow vulnerabilities. We fixed those in version 2.0-3.2. All later version are also not vulnerable. The patches were backported from 2.0.2 . We recommend you upgrade your junkbuster package immediately. wget url will fetch the file for you dpkg -i file.deb will install the referenced file. Debian GNU/Linux 2.0 alias hamm ------------------------------- This version of Debian was released only for the Intel and the Motorola 68xxx architecture. Source archives: ftp://ftp.debian.org/pub/debian/dists/proposed-updates/junkbuster_2.0-3.2.diff.gz MD5 checksum: b6f523b4a3a43761e58f98b971c0ad15 ftp://ftp.debian.org/pub/debian/dists/proposed-updates/junkbuster_2.0-3.2.dsc MD5 checksum: 3a504521a91ef2e0e33d6c3a4a2352e8 ftp://ftp.debian.org/pub/debian/dists/hamm/main/source/web/junkbuster_2.0.orig.tar.gz MD5 checksum: 8b0582f3001967964343f1fa5fe4c7aa Intel architecture: ftp://ftp.debian.org/pub/debian/dists/proposed-updates/junkbuster_2.0-3.2_i386.deb MD5 checksum: 7bb42ed33c19f49788d232b13119dc40 Motorola 68xxx architecture: ftp://ftp.debian.org/pub/debian/dists/proposed-updates/junkbuster_2.0-3.2_m68k.deb MD5 checksum: e5bb0b3e5eae51140bcbd3b43f71b4cb These files will be moved into ftp://ftp.debian.org/debian/dists/hamm/*/binary-$arch/ soon. For not yet released architectures please refer to the appropriate directory ftp://ftp.debian.org/debian/dists/sid/binary-$arch/ . -o- Subscribe: mail majordomoat_private with "subscribe isn". Today's ISN Sponsor: Repent Security Incorporated [www.repsec.com]
This archive was generated by hypermail 2b30 : Fri Apr 13 2001 - 13:11:06 PDT