-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ________________________________________________________________________
OpenPKG Security Advisory The OpenPKG Project http://www.openpkg.org/security.html http://www.openpkg.org [EMAIL PROTECTED] [EMAIL PROTECTED] OpenPKG-SA-2006.005 19-Feb-2006 ________________________________________________________________________ Package: tin Vulnerability: buffer overflow OpenPKG Specific: no Affected Releases: Affected Packages: Corrected Packages: OpenPKG CURRENT <= tin-1.8.0-20060113 >= tin-1.8.1-20060216 OpenPKG 2.5 <= tin-1.6.2-2.5.0 >= tin-1.6.2-2.5.1 OpenPKG 2.4 <= tin-1.6.2-2.4.1 >= tin-1.6.2-2.4.2 OpenPKG 2.3 <= tin-1.6.2-2.3.1 >= tin-1.6.2-2.3.2 Description: An allocation off-by-one bug exists in the TIN [1] news reader version 1.8.0 and earlier which can lead to a buffer overflow. ________________________________________________________________________ References: [1] http://www.tin.org/ ________________________________________________________________________ For security reasons, this advisory was digitally signed with the OpenPGP public key "OpenPKG <[EMAIL PROTECTED]>" (ID 63C4CB9F) of the OpenPKG project which you can retrieve from http://pgp.openpkg.org and hkp://pgp.openpkg.org. Follow the instructions on http://pgp.openpkg.org/ for details on how to verify the integrity of this advisory. ________________________________________________________________________ -----BEGIN PGP SIGNATURE----- Comment: OpenPKG <[EMAIL PROTECTED]> iD8DBQFD+GAxgHWT4GPEy58RAmoZAJ92hWIyXxPTqgDW1Q9Bxes8TyfxXACg92EJ 8wpsFu+17HYli7tx59HLOpU= =ebcm -----END PGP SIGNATURE-----