drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Pufferüberlauf in bogofilter
Name: |
Pufferüberlauf in bogofilter |
|
ID: |
MDVSA-2013:064 |
|
Distribution: |
Mandriva |
|
Plattformen: |
Mandriva Business Server 1.0 |
|
Datum: |
Mo, 8. April 2013, 18:09 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5468
https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0363 |
|
Applikationen: |
bogofilter |
|
Originalnachricht |
This is a multi-part message in MIME format...
------------=_1365435911-2161-291
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
_______________________________________________________________________
Mandriva Linux Security Advisory MDVSA-2013:064 http://www.mandriva.com/en/support/security/ _______________________________________________________________________
Package : bogofilter Date : April 8, 2013 Affected: Business Server 1.0 _______________________________________________________________________
Problem Description:
Updated bogofilter package fixes security vulnerability: In bogofilter before 1.2.3, bogofilter's/bogolexer's base64 could overwrite heap memory in the character set conversion in certain pathological cases of invalid base64 code that decodes to incomplete multibyte characters (CVE-2012-5468). _______________________________________________________________________
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-5468 https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0363 _______________________________________________________________________
Updated Packages:
Mandriva Business Server 1/X86_64: 738510e5f789844d29827337d13e5e9a mbs1/x86_64/bogofilter-1.2.2-3.1.mbs1.x86_64.rpm ac829bd49269ca4b868928e4056ffb3a mbs1/SRPMS/bogofilter-1.2.2-3.1.mbs1.src.rpm _______________________________________________________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/en/support/security/advisories/
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com _______________________________________________________________________
Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team <security*mandriva.com> -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux)
iD8DBQFRYrudmqjQ0CJFipgRAiRTAJ4o90/xBc/XOTCJ7g61we6HShGvmwCfSxSq JkuhPs2lYMg5dBDF+JkBnBg= =bO1i -----END PGP SIGNATURE-----
------------=_1365435911-2161-291 Content-Type: text/plain; charset="UTF-8"; name="message-footer.txt" Content-Disposition: inline; filename="message-footer.txt" Content-Transfer-Encoding: 8bit
To unsubscribe, send a email to sympa@mandrivalinux.org with this subject : unsubscribe security-announce _______________________________________________________ Want to buy your Pack or Services from Mandriva? Go to http://store.mandriva.com _______________________________________________________
------------=_1365435911-2161-291--
|
|
|
|