Login
Newsletter
Werbung

Sicherheit: Pufferüberlauf in kdelibs
Aktuelle Meldungen Distributionen
Name: Pufferüberlauf in kdelibs
ID: MDKSA-2006:019
Distribution: Mandriva
Plattformen: Mandriva Corporate 3.0, Mandriva 2006.0
Datum: Sa, 21. Januar 2006, 05:18
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0019
Applikationen: KDE Software Compilation

Originalnachricht

This is a multi-part message in MIME format...

------------=_1137817099-27339-77

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDKSA-2006:019
http://www.mandriva.com/security/
_______________________________________________________________________

Package : kdelibs
Date : January 20, 2006
Affected: 2006.0, Corporate 3.0
_______________________________________________________________________

Problem Description:

A heap overflow vulnerability was discovered in kjs, the KDE JavaScript
interpretter engine. An attacker could create a malicious web site
that contained carefully crafted JavaScript code that could trigger the
flaw and potentially lead to the arbitrary execution of code as the
user visiting the site.

The updated packages have been patched to correct this problem.
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0019
_______________________________________________________________________

Updated Packages:

Mandriva Linux 2006.0:
6d11e781a5112ab7d2c991df1bca4c0d
2006.0/RPMS/kdelibs-common-3.4.2-31.3.20060mdk.i586.rpm
09ddb324793a6af1e5bb55912896a9a1
2006.0/RPMS/kdelibs-devel-doc-3.4.2-31.3.20060mdk.i586.rpm
6211efda291f9327ed98d3aca442b1f0
2006.0/RPMS/libkdecore4-3.4.2-31.3.20060mdk.i586.rpm
77f643da674997a6ae38acd761f3016a
2006.0/RPMS/libkdecore4-devel-3.4.2-31.3.20060mdk.i586.rpm
57fb02e73896d75f28d9f9aad5f5dfef
2006.0/SRPMS/kdelibs-3.4.2-31.3.20060mdk.src.rpm

Mandriva Linux 2006.0/X86_64:
84b25eefbb6fa383dbc4ccf92c873f74
x86_64/2006.0/RPMS/kdelibs-common-3.4.2-31.3.20060mdk.x86_64.rpm
c3e42fe27e73df2da68ba768f0dbee4c
x86_64/2006.0/RPMS/kdelibs-devel-doc-3.4.2-31.3.20060mdk.x86_64.rpm
a6a7258b0990a09b099e039f54db18bb
x86_64/2006.0/RPMS/lib64kdecore4-3.4.2-31.3.20060mdk.x86_64.rpm
62a2e822dab43b67f7cdfb9258725d2b
x86_64/2006.0/RPMS/lib64kdecore4-devel-3.4.2-31.3.20060mdk.x86_64.rpm
6211efda291f9327ed98d3aca442b1f0
x86_64/2006.0/RPMS/libkdecore4-3.4.2-31.3.20060mdk.i586.rpm
77f643da674997a6ae38acd761f3016a
x86_64/2006.0/RPMS/libkdecore4-devel-3.4.2-31.3.20060mdk.i586.rpm
57fb02e73896d75f28d9f9aad5f5dfef
x86_64/2006.0/SRPMS/kdelibs-3.4.2-31.3.20060mdk.src.rpm

Corporate 3.0:
e3b716c3fef88118742882a139d589fa
corporate/3.0/RPMS/kdelibs-common-3.2-36.15.C30mdk.i586.rpm
439b0acb1afd62c8f894317ad5922557
corporate/3.0/RPMS/libkdecore4-3.2-36.15.C30mdk.i586.rpm
77e5302db914631a223c7fb6a55c623b
corporate/3.0/RPMS/libkdecore4-devel-3.2-36.15.C30mdk.i586.rpm
8399789d3975218e919c7544cf4fff41
corporate/3.0/SRPMS/kdelibs-3.2-36.15.C30mdk.src.rpm

Corporate 3.0/X86_64:
04d568123ae0f632020b16d7ca3c79b5
x86_64/corporate/3.0/RPMS/kdelibs-common-3.2-36.15.C30mdk.x86_64.rpm
6c0451aa188253c07d9865880cb32c35
x86_64/corporate/3.0/RPMS/lib64kdecore4-3.2-36.15.C30mdk.x86_64.rpm
22160903e03c77c575a84ed9ef045ac6
x86_64/corporate/3.0/RPMS/lib64kdecore4-devel-3.2-36.15.C30mdk.x86_64.rpm
439b0acb1afd62c8f894317ad5922557
x86_64/corporate/3.0/RPMS/libkdecore4-3.2-36.15.C30mdk.i586.rpm
8399789d3975218e919c7544cf4fff41
x86_64/corporate/3.0/SRPMS/kdelibs-3.2-36.15.C30mdk.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (GNU/Linux)

iD8DBQFD0Wo/mqjQ0CJFipgRAmZ5AJwIj2pNBFllFW3SJGKuFTtDxynGqACg0D5Q
gtPHEfoCPKr+iAPlyii2ugE=
=6CJe
-----END PGP SIGNATURE-----

------------=_1137817099-27339-77
Content-Type: text/plain; name="message-footer.txt"
Content-Disposition: inline; filename="message-footer.txt"
Content-Transfer-Encoding: 8bit

To unsubscribe, send a email to sympa@mandrivalinux.org
with this subject : unsubscribe security-announce
_______________________________________________________
Want to buy your Pack or Services from Mandriva?
Go to http://www.mandrivastore.com
Join the Club : http://www.mandrivaclub.com
_______________________________________________________

------------=_1137817099-27339-77--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung