drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Ausführen beliebiger Kommandos in python-pycrypto
Name: |
Ausführen beliebiger Kommandos in python-pycrypto |
|
ID: |
MDVSA-2009:050-1 |
|
Distribution: |
Mandriva |
|
Plattformen: |
Mandriva 2009.0 |
|
Datum: |
Mo, 23. Februar 2009, 20:57 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0544 |
|
Applikationen: |
python-pycrypto |
|
Originalnachricht |
This is a multi-part message in MIME format...
------------=_1235419033-6173-1378
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
_______________________________________________________________________
Mandriva Linux Security Advisory MDVSA-2009:050-1 http://www.mandriva.com/security/ _______________________________________________________________________
Package : python-pycrypto Date : February 23, 2009 Affected: 2009.0 _______________________________________________________________________
Problem Description:
A vulnerability have been discovered and corrected in PyCrypto ARC2 module 2.0.1, which allows remote attackers to cause a denial of service and possibly execute arbitrary code via a large ARC2 key length (CVE-2009-0544). The updated packages have been patched to prevent this.
Update:
The previous update package was not signed. _______________________________________________________________________
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0544 _______________________________________________________________________
Updated Packages:
Mandriva Linux 2009.0: e50d00d0c1a180f214ba9ad5d712e4e4 2009.0/i586/python-pycrypto-2.0.1-4.2mdv2009.0.i586.rpm 610275bf3bcc33e324cc42ea1a1e0021 2009.0/SRPMS/python-pycrypto-2.0.1-4.2mdv2009.0.src.rpm
Mandriva Linux 2009.0/X86_64: 77071b620a3b193ddc50bcc7e60873be 2009.0/x86_64/python-pycrypto-2.0.1-4.2mdv2009.0.x86_64.rpm 610275bf3bcc33e324cc42ea1a1e0021 2009.0/SRPMS/python-pycrypto-2.0.1-4.2mdv2009.0.src.rpm _______________________________________________________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com _______________________________________________________________________
Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team <security*mandriva.com> -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.9 (GNU/Linux)
iD8DBQFJotS4mqjQ0CJFipgRApphAJ93bx8hHgq9sqP9Kif8yIf5dBB4jQCfTdF9 EGojZQaxyi5w7NSFtX29qFA= =IOaM -----END PGP SIGNATURE-----
------------=_1235419033-6173-1378 Content-Type: text/plain; name="message-footer.txt" Content-Disposition: inline; filename="message-footer.txt" Content-Transfer-Encoding: 8bit
To unsubscribe, send a email to sympa@mandrivalinux.org with this subject : unsubscribe security-announce _______________________________________________________ Want to buy your Pack or Services from Mandriva? Go to http://www.mandrivastore.com Join the Club : http://www.mandrivaclub.com _______________________________________________________
------------=_1235419033-6173-1378--
|
|
|
|