5263450 2000-07-10 09:16 /76 rader/ Postmaster Mottagare: Bugtraq (import) <11654> Ärende: BitchX update ------------------------------------------------------------ Approved-By: aleph1@SECURITYFOCUS.COM Delivered-To: bugtraq@lists.securityfocus.com Delivered-To: bugtraq@securityfocus.com X-Authentication-Warning: devel.danen.net: vdanen set sender t vdanen@mandrakesoft.com using -f Mail-Followup-To: security-announce@linux-mandrake.com mdk-security@freezer-burn.org, bugtraq@securityfocus.com linux-security@redhat.com Mime-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: inline Content-Transfer-Encoding: 8bit User-Agent: Mutt/1.2.2i X-Operating-System: Linux Mandrake 2.2.15-4mdk i586 Message-ID: <20000707200553.B7237@mandrakesoft.com> Date: Fri, 7 Jul 2000 20:05:53 -0600 Reply-To: Vincent Danen <vdanen@MANDRAKESOFT.COM> Sender: Bugtraq List <BUGTRAQ@SECURITYFOCUS.COM> From: Vincent Danen <vdanen@MANDRAKESOFT.COM> Organization: Danen Consulting Services (www.danen.net) X-To: security-announce@linux-mandrake.com X-cc: mdk-security@freezer-burn.org, linux-security@redhat.com To: BUGTRAQ@SECURITYFOCUS.COM _____________________________________________________________________ Linux-Mandrake Security Update Advisory. _____________________________________________________________________ Date: July 7th, 2000 Package name: BitchX Affected versions: 6.1, 7.0, 7.1 Problem: A denial of service vulnerability exists in BitchX. Improper handling of incoming invitation messages can crash the client. Any user on IRC can send the client an invitation message that causes BitchX to segfault. Please upgrade to: md5sum: 5e34661e39b67283600ba138694730c5 6.1/RPMS/BitchX-75p3-12mdk.i586.rpm md5sum: d4876a7dc0b40226b8abbd80e01988a6 6.1/SRPMS/BitchX-75p3-12mdk.src.rpm md5sum: 4f28b30cb2bfd09cec05e0bf2af2da99 7.0/RPMS/BitchX-75p3-12mdk.i586.rpm md5sum: d4876a7dc0b40226b8abbd80e01988a6 7.0/SRPMS/BitchX-75p3-12mdk.src.rpm md5sum: f6297ab3e697cfa24762565a26ff6544 7.1/RPMS/BitchX-75p3-12mdk.i586.rpm md5sum: d4876a7dc0b40226b8abbd80e01988a6 7.1/SRPMS/BitchX-75p3-12mdk.src.rpm To upgrade automatically, use « MandrakeUpdate ». If you want to upgrade manually, download the updated package from one of our FTP server mirrors and uprade with "rpm -Uvh package_name". All mirrors are listed on http://www.mandrake.com/en/ftp.php3. Updated packages are available in the "updates/" directory. For example, if you are looking for an updated RPM package for Mandrake 7.1, look for it in: updates/7.1/RPMS/ Notes: - We give the md5 sum for each package. It lets you check the integrity of the downloaded package by running the md5sum command on the package ("md5sum package.rpm"). - You generally do not need to download the source package with a .src.rpm suffix - All the updated packages are listed on the website on http://www.linux-mandrake.com/en/fupdates.php3 - To subscribe/unsubscribe from the "security-announce" list and subscribe/unsubscribe from the "security-discuss" list see: http://www.linux-mandrake.com/en/flists.php3#security (5263450) ------------------------------------------(Ombruten)