Login
Newsletter
Werbung

Sicherheit: Überschreiben von Dateien in ktorrent
Aktuelle Meldungen Distributionen
Name: Überschreiben von Dateien in ktorrent
ID: MDKSA-2007:095
Distribution: Mandriva
Plattformen: Mandriva 2007.1
Datum: Mi, 2. Mai 2007, 05:15
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1799
Applikationen: KTorrent

Originalnachricht

This is a multi-part message in MIME format...

------------=_1178075745-8862-5278


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDKSA-2007:095
http://www.mandriva.com/security/
_______________________________________________________________________

Package : ktorrent
Date : May 1, 2007
Affected: 2007.1
_______________________________________________________________________

Problem Description:

A directory traversal vulnerability was found in KTorrent prior to
2.1.2, due to an incomplete fix for a prior directory traversal
vulnerability that was corrected in version 2.1.2. Previously,
KTorrent would only check for the string .., which could permit
strings such as ../.

Updated packages have been patched to correct this issue.
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1799
_______________________________________________________________________

Updated Packages:

Mandriva Linux 2007.1:
b95f63a9b094263407b5edd9fe7ee6e2
2007.1/i586/ktorrent-2.1.2-2.1mdv2007.1.i586.rpm
32512bebd21d579d2fa762c387e8efda
2007.1/i586/libktorrent2.1.2-2.1.2-2.1mdv2007.1.i586.rpm
151fe82f8fa9c1a3bb568d96ee098e08
2007.1/SRPMS/ktorrent-2.1.2-2.1mdv2007.1.src.rpm

Mandriva Linux 2007.1/X86_64:
545b1f969612aa961e48133c18cbb12f
2007.1/x86_64/ktorrent-2.1.2-2.1mdv2007.1.x86_64.rpm
5fa55787f9f581f79ade2254613222dd
2007.1/x86_64/lib64ktorrent2.1.2-2.1.2-2.1mdv2007.1.x86_64.rpm
151fe82f8fa9c1a3bb568d96ee098e08
2007.1/SRPMS/ktorrent-2.1.2-2.1mdv2007.1.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.7 (GNU/Linux)

iD8DBQFGN7c5mqjQ0CJFipgRAkY2AJ48jJB5PXsV8NIceC7oIfg1HXj4TACeL1Vl
UzHP4k6ff8EBveLVBVzQ7Uw=
=wLFJ
-----END PGP SIGNATURE-----


------------=_1178075745-8862-5278
Content-Type: text/plain; name="message-footer.txt"
Content-Disposition: inline; filename="message-footer.txt"
Content-Transfer-Encoding: 8bit

To unsubscribe, send a email to sympa@mandrivalinux.org
with this subject : unsubscribe security-announce
_______________________________________________________
Want to buy your Pack or Services from Mandriva?
Go to http://www.mandrivastore.com
Join the Club : http://www.mandrivaclub.com
_______________________________________________________

------------=_1178075745-8862-5278--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung