lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Sun, 19 Feb 2006 13:11:00 +0100 From: OpenPKG <openpkg@...npkg.org> To: bugtraq@...urityfocus.com Subject: [OpenPKG-SA-2006.005] OpenPKG Security Advisory (tin) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ________________________________________________________________________ OpenPKG Security Advisory The OpenPKG Project http://www.openpkg.org/security.html http://www.openpkg.org openpkg-security@...npkg.org openpkg@...npkg.org OpenPKG-SA-2006.005 19-Feb-2006 ________________________________________________________________________ Package: tin Vulnerability: buffer overflow OpenPKG Specific: no Affected Releases: Affected Packages: Corrected Packages: OpenPKG CURRENT <= tin-1.8.0-20060113 >= tin-1.8.1-20060216 OpenPKG 2.5 <= tin-1.6.2-2.5.0 >= tin-1.6.2-2.5.1 OpenPKG 2.4 <= tin-1.6.2-2.4.1 >= tin-1.6.2-2.4.2 OpenPKG 2.3 <= tin-1.6.2-2.3.1 >= tin-1.6.2-2.3.2 Description: An allocation off-by-one bug exists in the TIN [1] news reader version 1.8.0 and earlier which can lead to a buffer overflow. ________________________________________________________________________ References: [1] http://www.tin.org/ ________________________________________________________________________ For security reasons, this advisory was digitally signed with the OpenPGP public key "OpenPKG <openpkg@...npkg.org>" (ID 63C4CB9F) of the OpenPKG project which you can retrieve from http://pgp.openpkg.org and hkp://pgp.openpkg.org. Follow the instructions on http://pgp.openpkg.org/ for details on how to verify the integrity of this advisory. ________________________________________________________________________ -----BEGIN PGP SIGNATURE----- Comment: OpenPKG <openpkg@...npkg.org> iD8DBQFD+GAxgHWT4GPEy58RAmoZAJ92hWIyXxPTqgDW1Q9Bxes8TyfxXACg92EJ 8wpsFu+17HYli7tx59HLOpU= =ebcm -----END PGP SIGNATURE-----
Powered by blists - more mailing lists