[Please upgrade if you run the Jabber server on any distribution -- Raju] This is an RFC 1153 digest. (1 message) ----------------------------------------------------------------------
Message-ID: <[EMAIL PROTECTED]> From: [EMAIL PROTECTED] Sender: [EMAIL PROTECTED] To: [EMAIL PROTECTED] Subject: [Full-Disclosure] [SECURITY] [DSA 414-1] New jabber packages fix denial of service Date: Tue, 6 Jan 2004 17:00:07 -0800 -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - -------------------------------------------------------------------------- Debian Security Advisory DSA 414-1 [EMAIL PROTECTED] http://www.debian.org/security/ Matt Zimmerman January 6th, 2004 http://www.debian.org/security/faq - -------------------------------------------------------------------------- Package : jabber Vulnerability : denial of service Problem-Type : remote Debian-specific: no CVE Ids : CAN-2004-0013 A vulnerability was discovered in jabber, an instant messaging server, whereby a bug in the handling of SSL connections could cause the server process to crash, resulting in a denial of service. For the current stable distribution (woody) this problem has been fixed in version 1.4.2a-1.1woody1. For the unstable distribution (sid) this problem has been fixed in version 1.4.3-1. We recommend that you update your jabber package. Upgrade Instructions - -------------------- wget url will fetch the file for you dpkg -i file.deb will install the referenced file. If you are using the apt-get package manager, use the line for sources.list as given below: apt-get update will update the internal database apt-get upgrade will install corrected packages You may use an automated update by adding the resources from the footer to the proper configuration. Debian GNU/Linux 3.0 alias woody - -------------------------------- Source archives: http://security.debian.org/pool/updates/main/j/jabber/jabber_1.4.2a-1.1woody1.dsc Size/MD5 checksum: 580 efa342add13e86c05cb394604aab89d0 http://security.debian.org/pool/updates/main/j/jabber/jabber_1.4.2a-1.1woody1.diff.gz Size/MD5 checksum: 61467 d8b19d51fc83095db7132e1c5abc651c http://security.debian.org/pool/updates/main/j/jabber/jabber_1.4.2a.orig.tar.gz Size/MD5 checksum: 690217 10780dbdb93926ea5bb360e1186b939c Alpha architecture: http://security.debian.org/pool/updates/main/j/jabber/jabber_1.4.2a-1.1woody1_alpha.deb Size/MD5 checksum: 241262 e1dfb66863a3392f0e078503fc070ba3 ARM architecture: http://security.debian.org/pool/updates/main/j/jabber/jabber_1.4.2a-1.1woody1_arm.deb Size/MD5 checksum: 207750 4f6554511245c45dea401b767e60f8b8 Intel IA-32 architecture: http://security.debian.org/pool/updates/main/j/jabber/jabber_1.4.2a-1.1woody1_i386.deb Size/MD5 checksum: 196148 522769b98c8daafcbc98248c41bce10c Intel IA-64 architecture: http://security.debian.org/pool/updates/main/j/jabber/jabber_1.4.2a-1.1woody1_ia64.deb Size/MD5 checksum: 356460 e30221687c1df3ce1e04d56f07e18073 HP Precision architecture: http://security.debian.org/pool/updates/main/j/jabber/jabber_1.4.2a-1.1woody1_hppa.deb Size/MD5 checksum: 226222 e62ee0c273d73f325339a954058a6836 Motorola 680x0 architecture: http://security.debian.org/pool/updates/main/j/jabber/jabber_1.4.2a-1.1woody1_m68k.deb Size/MD5 checksum: 200616 7dcda4e913787e0511eb4dc148ce61ea Big endian MIPS architecture: http://security.debian.org/pool/updates/main/j/jabber/jabber_1.4.2a-1.1woody1_mips.deb Size/MD5 checksum: 203188 7124007a61770fc8146eaa7969757dd2 Little endian MIPS architecture: http://security.debian.org/pool/updates/main/j/jabber/jabber_1.4.2a-1.1woody1_mipsel.deb Size/MD5 checksum: 202356 31d39182928dca472a77a516fab60698 PowerPC architecture: http://security.debian.org/pool/updates/main/j/jabber/jabber_1.4.2a-1.1woody1_powerpc.deb Size/MD5 checksum: 205032 6a4ea17882063074292b7682abeb032a IBM S/390 architecture: http://security.debian.org/pool/updates/main/j/jabber/jabber_1.4.2a-1.1woody1_s390.deb Size/MD5 checksum: 210494 d631c49818c85f5b6b003c115b36b7cf Sun Sparc architecture: http://security.debian.org/pool/updates/main/j/jabber/jabber_1.4.2a-1.1woody1_sparc.deb Size/MD5 checksum: 224836 90d74ff4bc33673515d47e8ede21f6fa These files will probably be moved into the stable distribution on its next revision. - --------------------------------------------------------------------------------- For apt-get: deb http://security.debian.org/ stable/updates main For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main Mailing list: [EMAIL PROTECTED] Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg> -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.4 (GNU/Linux) iD8DBQE/+1oJArxCt0PiXR4RAmFKAKDZhlXQeKTrcNiLMhF3RGJCd1avZwCdEFmk g1JNGOzrB5wplcMLf6xtzo8= =8CXB -----END PGP SIGNATURE----- _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.netsys.com/full-disclosure-charter.html ------------------------------ End of this Digest ****************** -- Raj Mathur [EMAIL PROTECTED] http://kandalaya.org/ GPG: 78D4 FC67 367F 40E2 0DD5 0FEF C968 D0EF CC68 D17F It is the mind that moves ------------------------------------------------------- This SF.net email is sponsored by: IBM Linux Tutorials. Become an expert in LINUX or just sharpen your skills. Sign up for IBM's Free Linux Tutorials. Learn everything from the bash shell to sys admin. Click now! http://ads.osdn.com/?ad_id=1278&alloc_id=3371&op=click _______________________________________________ linux-india-help mailing list [EMAIL PROTECTED] https://lists.sourceforge.net/lists/listinfo/linux-india-help
