Debian: New turqstat packages fix buffer overflow
Summary
- --------------------------------------------------------------------------Debian Security Advisory DSA 812-1 security@debian.org http://www.debian.org/security/ Martin Schulze September 15th, 2005 http://www.debian.org/security/faq - --------------------------------------------------------------------------Package : turqstat Vulnerability : buffer overflow Problem type : remote Debian-specific: no CVE ID : CAN-2005-2658 Peter Karlsson discovered a buffer overflow in Turquoise SuperStat, a program for gathering statistics from Fidonet and Usenet, that can be exploited by a specially crafted NNTP server. For the old stable distribution (woody) this problem has been fixed in version 2.2.1woody1. For the stable distribution (sarge) this problem has been fixed in version 2.2.2sarge1. For the unstable distribution (sid) this problem has been fixed in version 2.2.4-1. We recommend that you upgrade your turqstat package. Upgrade Instructions - --------------------wget url will fetch the file for you dpkg -i file.deb will install the referenced file. If you are using the apt-get package manager, use the line for sources.list as given below: apt-get update will update the internal database apt-get upgrade will install corrected packages You may use an automated update by adding the resources from the footer to the proper configuration. Debian GNU/Linux 3.0 alias woody - -------------------------------- Source archives: Size/MD5 checksum: 544 d928fdfa27a159fdab8a5a8884fe5f89 Size/MD5 checksum: 270910 42d8a8a0a918f170de995d486c23b653 Alpha architecture: Size/MD5 checksum: 132096 906f3128869e6d7b0afd07cec132c72a Size/MD5 checksum: 176418 3109d357b362669a322ec7f5d3a95d7f ARM architecture: Size/MD5 checksum: 124080 f0fd9cedb36db2636a823aa8ade7c916 Size/MD5 checksum: 165586 15456da1a258074d87ce7732b3382498 Intel IA-32 architecture: Size/MD5 checksum: 113180 6eee07bf2fe43335b19c9b1629b6057f Size/MD5 checksum: 153308 8d8a680ee6838382d749936fd5e2a6f1 Intel IA-64 architecture: Size/MD5 checksum: 137222 789b31dcb961a9f4db2114f86b543bb2 Size/MD5 checksum: 187992 5699afd846374683fa0d8a5713966a71 HP Precision architecture: Size/MD5 checksum: 151334 01917983921193be6871f8d7f88ada9a Size/MD5 checksum: 189768 15400f31cf5cc357fe2b848fe833a334 Motorola 680x0 architecture: Size/MD5 checksum: 110610 41a66acf6252b48d8df4e4697eb77b11 Size/MD5 checksum: 149208 aae5619b44e2ceac583d0b1e88763812 Big endian MIPS architecture: Size/MD5 checksum: 111064 34b913e65e80b6911af2a02894d816bf Size/MD5 checksum: 146630 376ba9b7bff126d556e1fe31594e4728 Little endian MIPS architecture: Size/MD5 checksum: 107550 87be688734db30761800c310f1c8c1c1 Size/MD5 checksum: 142122 1bca8324176ebc4ae870e1c3d3beb398 PowerPC architecture: Size/MD5 checksum: 112282 bc6797f83d4c9a7ae1840abbe00db82f Size/MD5 checksum: 150786 0a40ea48ddffb8c13766ddfcd8bc496f IBM S/390 architecture: Size/MD5 checksum: 104326 4240b133663e82195a64c511d32bc15e Size/MD5 checksum: 139432 c27f7844b178a3d868c88b1aa495da12 Sun Sparc architecture: Size/MD5 checksum: 112886 a60fbcc55e894b9b658f710871d372b2 Size/MD5 checksum: 151838 e9f0531430def331ea663a2179d5a067 Debian GNU/Linux 3.1 alias sarge - -------------------------------- Source archives: Size/MD5 checksum: 551 ff23197169d40165a1d81e537dd32137 Size/MD5 checksum: 283780 a3a45fc896c7cd323a0f5920b1d6a63c Alpha architecture: Size/MD5 checksum: 110668 50293b365282f4db408f18490f240373 Size/MD5 checksum: 157870 b67322d2478cc2f66983fe25dd59737e AMD64 architecture: Size/MD5 checksum: 101154 d10054aebc7330706bf3f320a3ff6a5b Size/MD5 checksum: 143072 ea9531d04c0bd89b5c739b5b7800f94e ARM architecture: Size/MD5 checksum: 138204 c1fe5c573bcc3a45cb737d602f3ba4c5 Size/MD5 checksum: 183976 03a55e5783a24c298375ac0bb338c2f2 Intel IA-32 architecture: Size/MD5 checksum: 101718 29f9c8ed4061190bf384cf93a067a6f2 Size/MD5 checksum: 143188 b6bbb8562f7c0ecea4d39294248cb3ee Intel IA-64 architecture: Size/MD5 checksum: 122406 3894751f0c12ed40f868a48d721aa9ea Size/MD5 checksum: 173152 59a041fd4689ddec5e4fba55940a5b5e HP Precision architecture: Size/MD5 checksum: 122114 4b0a48530c521722ad2d635f3d56b385 Size/MD5 checksum: 172938 a173b5c4aad3958c375af803cd756550 Motorola 680x0 architecture: Size/MD5 checksum: 102090 ba002e24bb7a895be99b9915294dc1fc Size/MD5 checksum: 147268 896316b5b3513378160f89ea67e0a57d Big endian MIPS architecture: Size/MD5 checksum: 108740 ca396d064422ac90d9db281ccda3b154 Size/MD5 checksum: 147568 9ec920273e732b003fe5c89fbc01af75 Little endian MIPS architecture: Size/MD5 checksum: 105518 57c04fcbeea57eb5c9ad63ac4f43a0a1 Size/MD5 checksum: 144070 62c805442a1aa43331221ea6bce2dda7 PowerPC architecture: Size/MD5 checksum: 103126 99656e90993501fe4e35b8a8b03746f5 Size/MD5 checksum: 144386 0f35c9cd34a61ae4b94d77544edd1e48 IBM S/390 architecture: Size/MD5 checksum: 100554 717b9cd9da21deaf958a55490d1e9190 Size/MD5 checksum: 136704 911498ec823201e76f3cc1737dfa2d4c Sun Sparc architecture: Size/MD5 checksum: 104778 960e5ad3d3440798498dde2761a2195e Size/MD5 checksum: 144502 46c24e1d6d2bb57a80f3080cf1c2b238 These files will probably be moved into the stable distribution on its next update. - ---------------------------------------------------------------------------------For apt-get: deb http://security.debian.org/ stable/updates main For dpkg-ftp: dists/stable/updates/main Mailing list: debian-security-announce@lists.debian.org