[7293] in SIPB bug reports

home help back first fref pref prev next nref lref last post

exmh bug

daemon@ATHENA.MIT.EDU (Kev)
Tue Jun 8 09:37:12 1999

To: bug-sipb@MIT.EDU
Date: Tue, 08 Jun 1999 09:36:54 EDT
From: Kev <klmitch@MIT.EDU>

version 2.0.2 2/24/98
SunOS all-night-tool.mit.edu 5.6 Generic_105181-11 sun4u sparc SUNW,Ultra-60
Tk 8.0 Tcl 8.0

I have MIME display turned off.  Whenever I come across a message, such as
the one included below, that is marked with "Content-type: application/pgp;
format=text; x-action=sign", Exmh insists on displaying a blank body with
the following message:

This is a application/pgp
It might be displayable with metamail.	(Invoke menu with right button.)
	format = text
	x-action = sign

right-clicking the mouse over the body pops up the MIME menu, which has
an _active_ checkbox next to "Decode part as MIME".  This is obviously
bogus; clicking this checkbox brings up the message I'm expecting to get.

A sample message is included below...

------------------ Sample message ------------------
Received: from SOUTH-STATION-ANNEX.MIT.EDU by po9.MIT.EDU (5.61/4.7) id AA06603; Mon, 7 Jun 99 22:40:58 EDT
Received: from brimstone.netspace.org by MIT.EDU with SMTP
	id AA25133; Mon, 7 Jun 99 22:40:28 EDT
Received: from netspace.org ([128.148.157.6]:57608 "EHLO netspace.org" ident: "TIMEDOUT2") by brimstone.netspace.org with ESMTP id <51045-3239>; Mon, 7 Jun 1999 22:37:41 -0400
Received: from NETSPACE.ORG by NETSPACE.ORG (LISTSERV-TCP/IP release 1.8d) with
          spool id 1467873 for BUGTRAQ@NETSPACE.ORG; Tue, 8 Jun 1999 02:39:00
          +0000
Approved-By: aleph1@UNDERGROUND.ORG
Received: from underground.org (underground.org [209.179.181.153]) by
          netspace.org (8.8.7/8.8.7) with SMTP id VAA31352 for
          <bugtraq@netspace.org>; Mon, 7 Jun 1999 21:59:34 -0400
Received: (qmail 16371 invoked by uid 500); 8 Jun 1999 03:05:07 -0000
Received: (qmail 16330 invoked from network); 8 Jun 1999 02:44:34 -0000
Received: from murphy.debian.org (209.41.108.199) by underground.org with SMTP;
          8 Jun 1999 02:44:34 -0000
Received: (qmail 10770 invoked by uid 38); 8 Jun 1999 01:27:20 -0000
X-Envelope-Sender: wichert@cs.leidenuniv.nl
Mime-Version: 1.0
Old-Content-Type: text/plain; charset=us-ascii
X-Mailer: Mutt 0.95.4i
X-Debian: PGP check passed for security officers
Priority: urgent
X-Mailing-List: <debian-security-announce@lists.debian.org> archive/latest/53
X-Loop: debian-security-announce@lists.debian.org
Precedence: list
Content-Type: application/pgp; format=text; x-action=sign
Message-Id: <"VAKnMC.A.pmC.zFHX3"@murphy>
Date: 	Mon, 7 Jun 1999 20:05:07 -0700
Reply-To: security@debian.org
Sender: Bugtraq List <BUGTRAQ@NETSPACE.ORG>
Comments:     RFC822 error: <W> RESENT-DATE field duplicated. Last occurrence
              was retained.
Comments:     RFC822 error: <W> Incorrect or incomplete address field found and
              ignored.
Comments:     Resent-From: debian-security-announce@lists.debian.org
Comments:     Originally-From: Wichert Akkerman <wichert@cs.leidenuniv.nl>
From: debian-security-announce@LISTS.DEBIAN.ORG
Subject:      Subject: [SECURITY] New version of kernel-image for sparc fixes
              DoS attack
To: BUGTRAQ@NETSPACE.ORG

-----BEGIN PGP SIGNED MESSAGE-----

As is widely known by now the Linux 2.2.x kernels had a problem with
parsing IP options, which made them susceptible to a DoS attack.

The Debian GNU/Linux 2.1 release for the Sun sparc architecture uses such
a kernel. If you are using such a system and haven't upgraded the
kernel yourself, we recommend that you upgrade your kernel-image package
immediately.  If you have a sun4u system please use kernel-image-2.2.9-sun4u,
otherwise use the normal kernel-image-2.2.9 package.

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

Debian GNU/Linux 2.1 alias slink
- --------------------------------

  This version of Debian was released only for Intel, the Motorola
  680x0, the alpha and the Sun sparc architecture.

  Sun Sparc architecture:
    http://security.debian.org/dists/stable/updates/binary-sparc/kernel-headers-2.2.9_2.2.9-2_sparc.deb
      MD5 checksum: 2d8724b357c1444741f2fdd626e38615
    http://security.debian.org/dists/stable/updates/binary-sparc/kernel-image-2.2.9-sun4u_2.2.9-2_sparc.deb
      MD5 checksum: bbff1631f05124fed467d833276f8d68
    http://security.debian.org/dists/stable/updates/binary-sparc/kernel-image-2.2.9_2.2.9-2_sparc.deb
      MD5 checksum: 7c9e15ae2c7de1d84928660b964906ad

  These files will be copied into
  ftp://ftp.debian.org/debian/dists/stable/*/binary-sparc/ soon.

Please note you can also use apt to always get the latest security
updates. To do so add the following line to /etc/apt/sources.list:

  deb http://security.debian.org/ stable updates


- --
Debian GNU/Linux      .    Security Managers     .   security@debian.org
              debian-security-announce@lists.debian.org
  Christian Hudon     .     Wichert Akkerman     .     Martin Schulze
<chrish@debian.org>   .   <wakkerma@debian.org>  .   <joey@debian.org>

-----BEGIN PGP SIGNATURE-----
Version: 2.6.3ia
Charset: noconv

iQB1AwUBN1xhp6jZR/ntlUftAQHsKQL+NFpuuWWM2zJVTqLh0/0eIXIggpEaTpch
E/1wVfw59s+YmifKWupA9XYMy6ayjab6YDSnUHoD5drvKmWVLQEOdwJN58bbwWhy
EB69UmUtGi86aKZ5791u4Kn9nWLfWw1C
=PVkK
-----END PGP SIGNATURE-----


--
To UNSUBSCRIBE, email to debian-security-announce-request@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org
------------------ End sample message ------------------
-- 
Kevin L. Mitchell <klmitch@mit.edu>
-------------------------  -. .---- --.. ..- -..-  --------------------------
http://web.mit.edu/klmitch/www/               (PGP keys availiable from here)
    RSA AE87D37D/1024:  DE EA 1E 99 3F 2B F9 23  A0 D8 05 E0 6F BA B9 D2
    DSS ED0DB34E/1024: D9BF 0E74 FDCB 43F5 C597  878F 9455 EC24 ED0D B34E
    DH  2A2C31D4/2048: 1A77 4BA5 9E32 14AE 87DA  9FEC 7106 FC62 2A2C 31D4


home help back first fref pref prev next nref lref last post