Debian alert: New man-db packages fix problem with DSA-364-1

Posted by dave on Aug 8, 2003 5:51 AM EDT
Mailing list
Mail this story
Print this story

The previous man-db update (DSA-364-1) introduced an error which resulted in a segmentation fault in the "mandb" command, which runs part of the daily cron job. This error was caused by allocating a memory region which was one byte too small to hold the data written into it.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- --------------------------------------------------------------------------
Debian Security Advisory DSA 364-2                     security@debian.org
http://www.debian.org/security/                             Matt Zimmerman
August 8th, 2003                        http://www.debian.org/security/faq
- --------------------------------------------------------------------------

Package        : man-db

The previous man-db update (DSA-364-1) introduced an error which
resulted in a segmentation fault in the "mandb" command, which runs
part of the daily cron job.  This error was caused by allocating a
memory region which was one byte too small to hold the data written
into it.

For the current stable distribution (woody), these problems have been
fixed in version 2.3.20-18.woody.3.

The unstable distribution (sid) was not affected by this problem.

We recommend that you update your man-db package.

Upgrade Instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 3.0 alias woody
- --------------------------------

  Source archives:

    http://security.debian.org/pool/updates/main/m/man-db/man-db_2.3.20-18.woody.3.dsc
      Size/MD5 checksum:      632 227678648c57982f1f94c68d87e981d5
    http://security.debian.org/pool/updates/main/m/man-db/man-db_2.3.20-18.woody.3.diff.gz
      Size/MD5 checksum:   106656 c97fb4fd035abc8d1b8424473491b898
    http://security.debian.org/pool/updates/main/m/man-db/man-db_2.3.20.orig.tar.gz
      Size/MD5 checksum:   516391 5021f8a23cba9b14df39aa06407baefb

  Alpha architecture:

    http://security.debian.org/pool/updates/main/m/man-db/man-db_2.3.20-18.woody.3_alpha.deb
      Size/MD5 checksum:   543442 ad21bfda434e3a56db351b28811a4519

  ARM architecture:

    http://security.debian.org/pool/updates/main/m/man-db/man-db_2.3.20-18.woody.3_arm.deb
      Size/MD5 checksum:   478496 33f5f7ec1baf4faae4fea10e95d0ae93

  Intel IA-32 architecture:

    http://security.debian.org/pool/updates/main/m/man-db/man-db_2.3.20-18.woody.3_i386.deb
      Size/MD5 checksum:   472870 1cd24fded9ab886c695b4edadebf5246

  Intel IA-64 architecture:

    http://security.debian.org/pool/updates/main/m/man-db/man-db_2.3.20-18.woody.3_ia64.deb
      Size/MD5 checksum:   601620 48dc7ae70e91dd0c0f19e22a525150c2

  HP Precision architecture:

    http://security.debian.org/pool/updates/main/m/man-db/man-db_2.3.20-18.woody.3_hppa.deb
      Size/MD5 checksum:   521106 0359e7f0549e37fd7e214d0f29e7924b

  Motorola 680x0 architecture:

    http://security.debian.org/pool/updates/main/m/man-db/man-db_2.3.20-18.woody.3_m68k.deb
      Size/MD5 checksum:   467820 78e883311d0e79c6081fce9e735764f7

  Big endian MIPS architecture:

    http://security.debian.org/pool/updates/main/m/man-db/man-db_2.3.20-18.woody.3_mips.deb
      Size/MD5 checksum:   516078 7f114851118f566c7804d6fcc083b84b

  Little endian MIPS architecture:

    http://security.debian.org/pool/updates/main/m/man-db/man-db_2.3.20-18.woody.3_mipsel.deb
      Size/MD5 checksum:   517222 5006637a73f6f128f9499d1d15db482e

  PowerPC architecture:

    http://security.debian.org/pool/updates/main/m/man-db/man-db_2.3.20-18.woody.3_powerpc.deb
      Size/MD5 checksum:   494048 aefd0057ae510a5224cf5832aade1349

  IBM S/390 architecture:

    http://security.debian.org/pool/updates/main/m/man-db/man-db_2.3.20-18.woody.3_s390.deb
      Size/MD5 checksum:   479140 a2535ea11fc3db9db6e8e563448f56d8

  Sun Sparc architecture:

    http://security.debian.org/pool/updates/main/m/man-db/man-db_2.3.20-18.woody.3_sparc.deb
      Size/MD5 checksum:   479340 69bf25dd1287d7902e819dfcf7671669

  These files will probably be moved into the stable distribution on
  its next revision.

- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.2 (GNU/Linux)

iD8DBQE/M6q5ArxCt0PiXR4RAji9AKC71RdmUVG3RQW3RGsz+L1r9uk9uQCghkdy
peSHmIwI5tL1qmSpM7W6BRg=
=Swj0
-----END PGP SIGNATURE-----


  Nav
» Read more about: Story Type: Security; Groups: Debian

« Return to the newswire homepage

This topic does not have any threads posted yet!

You cannot post until you login.