[Subject Prev][Subject Next][Thread Prev][Thread Next][Subject Index][Thread Index]

(fwd) [CLA-2001:387] Conectiva Linux Security Announcement - icecast



[Not distribution-specific.  Please upgrade if you use Icecast --
Raju]

This is an RFC 1153 digest.
(1 message)
----------------------------------------------------------------------

Return-Path: <BUGTRAQ@xxxxxxxxxxxxxxxxx>
Approved-By: aleph1@xxxxxxxxxxxxxxxxx
Delivered-To: bugtraq@xxxxxxxxxxxxxxxxxxxxxxx
X-Mailer: SAC - Sistema de Anuncios Conectiva v1.1 (PHP/3.0.18)
Message-ID:  <200103191417.LAA32699@xxxxxxxxxxxxxxxxxxxxxxxx>
Reply-To: secure@xxxxxxxxxxxxxxxx
X-To:         conectiva-updates@xxxxxxxxxxxxxxxxxxxxxxxxxxx,
              linuxlist@xxxxxxxxxxxxxxxxxx, lwn@xxxxxxx,
              security-alert@xxxxxxxxxxxxxxxxx
From: secure@xxxxxxxxxxxxxxxx
Sender: Bugtraq List <BUGTRAQ@xxxxxxxxxxxxxxxxx>
To: BUGTRAQ@xxxxxxxxxxxxxxxxx
Subject:      [CLA-2001:387] Conectiva Linux Security Announcement - icecast
Date:         Mon, 19 Mar 2001 11:17:06 -0300

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- --------------------------------------------------------------------------
CONECTIVA LINUX SECURITY ANNOUNCEMENT
- --------------------------------------------------------------------------

PACKAGE   : icecast
SUMMARY   : Remote buffer overflow vulnerabilities
DATE      : 2001-03-19 11:15:00
ID        : CLA-2001:387
RELEVANT
RELEASES  : 4.1, 4.2, 5.0, 5.1, 6.0

- -------------------------------------------------------------------------

DESCRIPTION
 "icecast" is a server used to distribute audio streams to compatible
 clients such as winamp, mpg123, xmms and many others.
 Matt Messier (mmessier@xxxxxxxxxxxx) and John Viega (viega@xxxxxxxx)
 have identified several buffer overflow and format strings problems
 in Icecast that could be remotely exploited.
 Our latest update to this software changes the package to use an
 unprivileged user ("icecast") for the daemon, so the impact of this
 vulnerability is not as high. Recent distributions (CL >= 5.1) have
 this package compiled with StackGuard to make it more difficult to
 exploit buffer overflows.


SOLUTION
 All icecast users are urged to upgrade.


DIRECT DOWNLOAD LINKS TO THE UPDATED PACKAGES
ftp://atualizacoes.conectiva.com.br/4.1/SRPMS/icecast-1.3.9-2cl.src.rpm
ftp://atualizacoes.conectiva.com.br/4.1/i386/icecast-1.3.9-2cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/4.2/SRPMS/icecast-1.3.9-2cl.src.rpm
ftp://atualizacoes.conectiva.com.br/4.2/i386/icecast-1.3.9-2cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/5.0/SRPMS/icecast-1.3.9-2cl.src.rpm
ftp://atualizacoes.conectiva.com.br/5.0/i386/icecast-1.3.9-2cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/5.1/SRPMS/icecast-1.3.9-2cl.src.rpm
ftp://atualizacoes.conectiva.com.br/5.1/i386/icecast-1.3.9-2cl.i386.rpm
ftp://atualizacoes.conectiva.com.br/6.0/SRPMS/icecast-1.3.9-2cl.src.rpm
ftp://atualizacoes.conectiva.com.br/6.0/RPMS/icecast-1.3.9-2cl.i386.rpm


ADDITIONAL INSTRUCTIONS
 Users of Conectiva Linux version 6.0 or higher may use apt to perform
 upgrades of RPM packages:
 - add the following line to /etc/apt/sources.list if it is not there yet
   (you may also use linuxconf to do this):

 rpm [cncbr] ftp://atualizacoes.conectiva.com.br 6.0/conectiva updates

(replace 6.0 with the correct version number if you are not running CL6.0)

 - run:                 apt-get update
 - after that, execute: apt-get upgrade

 Detailed instructions reagarding the use of apt and upgrade examples
 can be found at http://distro.conectiva.com.br/atualizacoes/#apt?idioma=en


- -------------------------------------------------------------------------
All packages are signed with Conectiva's GPG key. The key and instructions
on how to import it can be found at
http://distro.conectiva.com.br/seguranca/chave/?idioma=en
Instructions on how to check the signatures of the RPM packages can be
found at http://distro.conectiva.com.br/seguranca/politica/?idioma=en
- -------------------------------------------------------------------------
All our advisories and generic update instructions can be viewed at
http://distro.conectiva.com.br/atualizacoes/?idioma=en

- -------------------------------------------------------------------------
subscribe: conectiva-updates-subscribe@xxxxxxxxxxxxxxxxxxxxxxxxxxx
unsubscribe: conectiva-updates-unsubscribe@xxxxxxxxxxxxxxxxxxxxxxxxxxx
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.4 (GNU/Linux)
Comment: For info see http://www.gnupg.org

iD8DBQE6thTh42jd0JmAcZARAploAJ94H3Z0YIjBss2P4SFAcUGFnKCqaQCgv+m3
wVdA7bseFkvOoC/6NWmMHM8=
=rQ+q
-----END PGP SIGNATURE-----

------------------------------

End of this Digest
******************

-- 
Raju Mathur          raju@xxxxxxxxxxxxx           http://kandalaya.org/