Secunia Security Advisory - Debian has issued an update for weechat. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).
57f4b2daae5718dca01fd8ad113d2bff377f4c03f0330af27685e6b69ab4699a
----------------------------------------------------------------------
Did you know? Our assessment and impact rating along with detailed
information such as exploit code availability, or if an updated patch
is released by the vendor, is not part of this mailing-list?
Click here to learn more about our commercial solutions:
http://secunia.com/advisories/business_solutions/
Click here to trial our solutions:
http://secunia.com/advisories/try_vi/
----------------------------------------------------------------------
TITLE:
Debian update for weechat
SECUNIA ADVISORY ID:
SA34328
VERIFY ADVISORY:
http://secunia.com/advisories/34328/
DESCRIPTION:
Debian has issued an update for weechat. This fixes a vulnerability,
which can be exploited by malicious people to cause a DoS (Denial of
Service).
For more information:
SA34304
SOLUTION:
Apply updated packages.
-- Debian GNU/Linux 5.0 alias lenny --
Source archives:
http://security.debian.org/pool/updates/main/w/weechat/weechat_0.2.6.orig.tar.gz
Size/MD5 checksum: 1615289 96fec32d773e650fed0eb21d51a9a945
http://security.debian.org/pool/updates/main/w/weechat/weechat_0.2.6-1+lenny1.diff.gz
Size/MD5 checksum: 2987 5a823583d320e0112fbf6f65c8d9d5a9
http://security.debian.org/pool/updates/main/w/weechat/weechat_0.2.6-1+lenny1.dsc
Size/MD5 checksum: 1288 95517e879e64485b1d8d2f0d93c231dc
Architecture independent packages:
http://security.debian.org/pool/updates/main/w/weechat/weechat_0.2.6-1+lenny1_all.deb
Size/MD5 checksum: 19814 3dc3c119f404e9c06f01a2433058431e
http://security.debian.org/pool/updates/main/w/weechat/weechat-common_0.2.6-1+lenny1_all.deb
Size/MD5 checksum: 431768 8ba3ac668a829fcb4a5bdeb282249fc8
amd64 architecture (AMD x86_64 (AMD64))
http://security.debian.org/pool/updates/main/w/weechat/weechat-curses_0.2.6-1+lenny1_amd64.deb
Size/MD5 checksum: 214810 96cd728e453b0e2c24681fbdd51c376f
http://security.debian.org/pool/updates/main/w/weechat/weechat-plugins_0.2.6-1+lenny1_amd64.deb
Size/MD5 checksum: 119354 c6f0ac09b5ee2b32d3fabf7515501c4a
arm architecture (ARM)
http://security.debian.org/pool/updates/main/w/weechat/weechat-curses_0.2.6-1+lenny1_arm.deb
Size/MD5 checksum: 192764 1ba5ba2f44affa3ea338cd230acde438
http://security.debian.org/pool/updates/main/w/weechat/weechat-plugins_0.2.6-1+lenny1_arm.deb
Size/MD5 checksum: 106736 f395304b5289245684ec30837bded1c1
armel architecture (ARM EABI)
http://security.debian.org/pool/updates/main/w/weechat/weechat-curses_0.2.6-1+lenny1_armel.deb
Size/MD5 checksum: 195740 39cfcdb47694c7883979d2da7ab619aa
http://security.debian.org/pool/updates/main/w/weechat/weechat-plugins_0.2.6-1+lenny1_armel.deb
Size/MD5 checksum: 108830 ea4f281358563ac7e3cc396f0ee10501
hppa architecture (HP PA RISC)
http://security.debian.org/pool/updates/main/w/weechat/weechat-curses_0.2.6-1+lenny1_hppa.deb
Size/MD5 checksum: 223536 a83b056f959796e74629b5efd3617616
http://security.debian.org/pool/updates/main/w/weechat/weechat-plugins_0.2.6-1+lenny1_hppa.deb
Size/MD5 checksum: 130270 7451de93d928fbd453eaf3a95dde1b65
i386 architecture (Intel ia32)
http://security.debian.org/pool/updates/main/w/weechat/weechat-plugins_0.2.6-1+lenny1_i386.deb
Size/MD5 checksum: 107776 ec239c51343e0ace3479559d9d7eaa7b
http://security.debian.org/pool/updates/main/w/weechat/weechat-curses_0.2.6-1+lenny1_i386.deb
Size/MD5 checksum: 189350 c95243a796896dde0b87f0da1aecfc7d
ia64 architecture (Intel ia64)
http://security.debian.org/pool/updates/main/w/weechat/weechat-plugins_0.2.6-1+lenny1_ia64.deb
Size/MD5 checksum: 149346 8f430bd31e411583fdbca07a11f9be27
http://security.debian.org/pool/updates/main/w/weechat/weechat-curses_0.2.6-1+lenny1_ia64.deb
Size/MD5 checksum: 315132 4a2f20117d12ccf245c798f7ed77da50
mips architecture (MIPS (Big Endian))
http://security.debian.org/pool/updates/main/w/weechat/weechat-curses_0.2.6-1+lenny1_mips.deb
Size/MD5 checksum: 214212 bae1939afacb219991d1a96ba79fd61c
http://security.debian.org/pool/updates/main/w/weechat/weechat-plugins_0.2.6-1+lenny1_mips.deb
Size/MD5 checksum: 95196 6bb1cc04140c54080782765e2449dbe3
mipsel architecture (MIPS (Little Endian))
http://security.debian.org/pool/updates/main/w/weechat/weechat-curses_0.2.6-1+lenny1_mipsel.deb
Size/MD5 checksum: 214114 a37aa2884f081d654caceda230c19fab
http://security.debian.org/pool/updates/main/w/weechat/weechat-plugins_0.2.6-1+lenny1_mipsel.deb
Size/MD5 checksum: 94412 8cdd416097d5c5c7a3372cf74fe0868e
powerpc architecture (PowerPC)
http://security.debian.org/pool/updates/main/w/weechat/weechat-curses_0.2.6-1+lenny1_powerpc.deb
Size/MD5 checksum: 213552 b6388948dd607888576328cfab3d5ffe
http://security.debian.org/pool/updates/main/w/weechat/weechat-plugins_0.2.6-1+lenny1_powerpc.deb
Size/MD5 checksum: 130426 5dad2dd2db74cd00cbcd8f408a607a23
s390 architecture (IBM S/390)
http://security.debian.org/pool/updates/main/w/weechat/weechat-curses_0.2.6-1+lenny1_s390.deb
Size/MD5 checksum: 208666 c5e3a27466af91c297fb11187fe1fb31
http://security.debian.org/pool/updates/main/w/weechat/weechat-plugins_0.2.6-1+lenny1_s390.deb
Size/MD5 checksum: 112248 921633d25598e4db478f8623a1b509e2
sparc architecture (Sun SPARC/UltraSPARC)
http://security.debian.org/pool/updates/main/w/weechat/weechat-curses_0.2.6-1+lenny1_sparc.deb
Size/MD5 checksum: 188520 f7354ec16c2629cc2ca8976afe5fd057
http://security.debian.org/pool/updates/main/w/weechat/weechat-plugins_0.2.6-1+lenny1_sparc.deb
Size/MD5 checksum: 109596 0d6bf31e83729c47b7598aee5d3f87e0
-- Debian GNU/Linux unstable alias sid --
Fixed in version 0.2.6.1-1.
ORIGINAL ADVISORY:
DSA-1744-1:
http://lists.debian.org/debian-security-announce/2009/msg00054.html
OTHER REFERENCES:
SA34304:
http://secunia.com/advisories/34304/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------