drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Pufferüberlauf in wpa_supplicant
Name: |
Pufferüberlauf in wpa_supplicant |
|
ID: |
MDKSA-2007:245 |
|
Distribution: |
Mandriva |
|
Plattformen: |
Mandriva 2008.0 |
|
Datum: |
Do, 13. Dezember 2007, 22:26 |
|
Referenzen: |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6025 |
|
Applikationen: |
wpa_supplicant |
|
Originalnachricht |
This is a multi-part message in MIME format...
------------=_1197581149-4794-6505
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
_______________________________________________________________________ Mandriva Linux Security Advisory MDKSA-2007:245 http://www.mandriva.com/security/ _______________________________________________________________________ Package : wpa_supplicant Date : December 13, 2007 Affected: 2008.0 _______________________________________________________________________ Problem Description: Stack-based buffer overflow in driver_wext.c in wpa_supplicant 0.6.0 allows remote attackers to cause a denial of service (crash) via crafted TSF data. Updated package fixes this issue. _______________________________________________________________________
References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-6025 _______________________________________________________________________ Updated Packages: Mandriva Linux 2008.0: 80c2dc52d42fb324f6ff90fcfe02b9fa 2008.0/i586/wpa_gui-0.6.0-1.1mdv2008.0.i586.rpm 0ec22d8e71719af986748a86ee4063ce 2008.0/i586/wpa_supplicant-0.6.0-1.1mdv2008.0.i586.rpm 18581ca13cf1758016bfaf52a0ea4992 2008.0/SRPMS/wpa_supplicant-0.6.0-1.1mdv2008.0.src.rpm
Mandriva Linux 2008.0/X86_64: 677b536c2f630585c2df72a832aee497 2008.0/x86_64/wpa_gui-0.6.0-1.1mdv2008.0.x86_64.rpm 0c87ce95a9432518480ccdc7eed168bb 2008.0/x86_64/wpa_supplicant-0.6.0-1.1mdv2008.0.x86_64.rpm 18581ca13cf1758016bfaf52a0ea4992 2008.0/SRPMS/wpa_supplicant-0.6.0-1.1mdv2008.0.src.rpm _______________________________________________________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com _______________________________________________________________________
Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team <security*mandriva.com> -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.7 (GNU/Linux)
iD8DBQFHYXedmqjQ0CJFipgRAhPNAJsH5R9sOhbryDMXZr2ZidM6EofWewCg2CHm DI6aimKhL9T+IazFIlxpxkk= =Ue4m -----END PGP SIGNATURE-----
------------=_1197581149-4794-6505 Content-Type: text/plain; name="message-footer.txt" Content-Disposition: inline; filename="message-footer.txt" Content-Transfer-Encoding: 8bit
To unsubscribe, send a email to sympa@mandrivalinux.org with this subject : unsubscribe security-announce _______________________________________________________ Want to buy your Pack or Services from Mandriva? Go to http://www.mandrivastore.com Join the Club : http://www.mandrivaclub.com _______________________________________________________
------------=_1197581149-4794-6505--
|
|
|
|