drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Pufferüberlauf in ulogd
Name: |
Pufferüberlauf in ulogd |
|
ID: |
MDKSA-2007:028 |
|
Distribution: |
Mandriva |
|
Plattformen: |
Mandriva Corporate 4.0 |
|
Datum: |
Sa, 27. Januar 2007, 06:06 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0460 |
|
Applikationen: |
ulogd |
|
Originalnachricht |
This is a multi-part message in MIME format...
------------=_1169874396-16192-8517
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
_______________________________________________________________________ Mandriva Linux Security Advisory MDKSA-2007:028 http://www.mandriva.com/security/ _______________________________________________________________________ Package : ulogd Date : January 26, 2007 Affected: Corporate 4.0 _______________________________________________________________________ Problem Description: Buffer overflow in ulogd has unknown impact and attack vectors related to "improper string length calculations."
The updated packages have been patched to correct this issue. _______________________________________________________________________
References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0460 _______________________________________________________________________ Updated Packages: Corporate 4.0: cb3fffdef63f6e7cc08bccc05b1e882c corporate/4.0/i586/ulogd-1.23-2.1.20060mlcs4.i586.rpm 784cbd25194bb71a3c197deb80f3b634 corporate/4.0/i586/ulogd-mysql-1.23-2.1.20060mlcs4.i586.rpm 76b7cb8610d47b7813d42f9878644336 corporate/4.0/i586/ulogd-pcap-1.23-2.1.20060mlcs4.i586.rpm 235a2afc3e88863082f2e9678316e5be corporate/4.0/i586/ulogd-pgsql-1.23-2.1.20060mlcs4.i586.rpm 418d6653046ddea3f3e9bfc3b9ee25c7 corporate/4.0/i586/ulogd-sqlite-1.23-2.1.20060mlcs4.i586.rpm 9873e7960f48810dd0d8fe5f72b2ebfc corporate/4.0/SRPMS/ulogd-1.23-2.1.20060mlcs4.src.rpm
Corporate 4.0/X86_64: 3da5d0b9bf6af4d69f34cccecea42cfe corporate/4.0/x86_64/ulogd-1.23-2.1.20060mlcs4.x86_64.rpm bee5bd7a190f23e5c15be8b4f7b052be corporate/4.0/x86_64/ulogd-mysql-1.23-2.1.20060mlcs4.x86_64.rpm 982b1a66fccd7df9ffa3272e0303f2e4 corporate/4.0/x86_64/ulogd-pcap-1.23-2.1.20060mlcs4.x86_64.rpm e6cc11f6261021dd91b8ab970f6a1619 corporate/4.0/x86_64/ulogd-pgsql-1.23-2.1.20060mlcs4.x86_64.rpm 3e5a8211885c04b4b3df58b9e147a0e7 corporate/4.0/x86_64/ulogd-sqlite-1.23-2.1.20060mlcs4.x86_64.rpm 9873e7960f48810dd0d8fe5f72b2ebfc corporate/4.0/SRPMS/ulogd-1.23-2.1.20060mlcs4.src.rpm _______________________________________________________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com _______________________________________________________________________
Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team <security*mandriva.com> -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.6 (GNU/Linux)
iD8DBQFFun6JmqjQ0CJFipgRAgeIAKDzzFjWxExEMHbpzn+RLE3NJwiLcwCfSvU6 DSrLKRpU2m1uyJpM9IQ84BU= =17Rv -----END PGP SIGNATURE-----
------------=_1169874396-16192-8517 Content-Type: text/plain; name="message-footer.txt" Content-Disposition: inline; filename="message-footer.txt" Content-Transfer-Encoding: 8bit
To unsubscribe, send a email to sympa@mandrivalinux.org with this subject : unsubscribe security-announce _______________________________________________________ Want to buy your Pack or Services from Mandriva? Go to http://www.mandrivastore.com Join the Club : http://www.mandrivaclub.com _______________________________________________________
------------=_1169874396-16192-8517--
|
|
|
|