Login
Newsletter
Werbung

Sicherheit: Preisgabe von Informationen in html2ps
Aktuelle Meldungen Distributionen
Name: Preisgabe von Informationen in html2ps
ID: MDVSA-2012:161
Distribution: Mandriva
Plattformen: Keine Angabe
Datum: Sa, 6. Oktober 2012, 21:21
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5067
Applikationen: html2ps

Originalnachricht

This is a multi-part message in MIME format...

------------=_1349519632-4618-278

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2012:161
http://www.mandriva.com/security/
_______________________________________________________________________

Package : html2ps
Date : October 6, 2012
Affected: 2011.
_______________________________________________________________________

Problem Description:

A vulnerability has been found and corrected in html2ps:

Directory traversal vulnerability in html2ps before 1.0b7 allows
remote attackers to read arbitrary files via directory traversal
sequences in SSI directives (CVE-2009-5067).

The updated packages have been upgraded to the 1.0b7 version which
is not affected by this issue.
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-5067
_______________________________________________________________________

Updated Packages:

Mandriva Linux 2011:
a0ef74f6f963d98fc4305994bf810dbf
2011/i586/html2ps-2.0-2.b7.0.1-mdv2011.0.noarch.rpm
fc582a56f07cdce61aabec91ed261870
2011/i586/xhtml2ps-2.0-2.b7.0.1-mdv2011.0.noarch.rpm
93aa1dc24c23c205360f5513816353d3 2011/SRPMS/html2ps-2.0-2.b7.0.1.src.rpm

Mandriva Linux 2011/X86_64:
528aa56f1547da9a385cf1ef01445e73
2011/x86_64/html2ps-2.0-2.b7.0.1-mdv2011.0.noarch.rpm
7c167fb40bc2655231eafe734c738a4d
2011/x86_64/xhtml2ps-2.0-2.b7.0.1-mdv2011.0.noarch.rpm
93aa1dc24c23c205360f5513816353d3 2011/SRPMS/html2ps-2.0-2.b7.0.1.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)

iD8DBQFQb90WmqjQ0CJFipgRAqZxAKDoo7b1mmAMd/jwwKGCbYK0G8wkhgCdF8R/
E/ExUIDSWh+VeqW4s3in0+0=
=4pmC
-----END PGP SIGNATURE-----


------------=_1349519632-4618-278
Content-Type: text/plain; charset="UTF-8";
name="message-footer.txt"
Content-Disposition: inline; filename="message-footer.txt"
Content-Transfer-Encoding: 8bit

To unsubscribe, send a email to sympa@mandrivalinux.org
with this subject : unsubscribe security-announce
_______________________________________________________
Want to buy your Pack or Services from Mandriva?
Go to http://www.mandrivastore.com
Join the Club : http://www.mandrivaclub.com
_______________________________________________________

------------=_1349519632-4618-278--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung