A Denial Of Service (DoS) vulnerability was discovered in BitchX that
would allow a remote attacker to crash BitchX by changing certain
channel modes. This vulnerability has been fixed in CVS and patched
in the released updates.
f7a5912371b9448aaac7dd07c07228db 9.0/RPMS/BitchX-1.0-0.c19.3.1mdk.i586.rpm eccf1c1bc8a462301a6b2ef5e28c6bb1 9.0/SRPMS/BitchX-1.0-0.c19.3.1mdk.src.rpm
53da858527f6a86605cd6f174d755b9e 9.1/RPMS/BitchX-1.0-0.c19.4.1mdk.i586.rpm c6ab39e1df8edf246cc00eef76079bfe 9.1/SRPMS/BitchX-1.0-0.c19.4.1mdk.src.rpm
bea7910e9e469719de2f5add64c82b16 ppc/9.1/RPMS/BitchX-1.0-0.c19.4.1mdk.ppc.rpm c6ab39e1df8edf246cc00eef76079bfe ppc/9.1/SRPMS/BitchX-1.0-0.c19.4.1mdk.src.rpm
To upgrade automatically, use MandrivaUpdate.
Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command :
rpm --checksig package.rpm
You can get the GPG public key of the Mandriva Security Team to verify the GPG signature of each RPM.
If you use MandrivaUpdate, the verification of md5 checksum and GPG signature is performed automatically for you.