User: Password:
|
|
Subscribe / Log in / New account

Mageia alert MGASA-2012-0265 (bip)

From:  Mageia Updates <buildsystem-daemon@mageia.org>
To:  updates-announce@ml.mageia.org
Subject:  [updates-announce] MGASA-2012-0265: bip-0.8.8-1.2.mga1 (1/core), bip-0.8.8-5.2.mga2 (2/core)
Date:  Thu, 13 Sep 2012 13:38:16 +0200
Message-ID:  <20120913113816.GA26491@valstar.mageia.org>
Archive-link:  Article, Thread

MGASA-2012-0265 Date: September 13th, 2012 Affected releases: 1, 2 Description: Updated bip package fixes security vulnerability: Buffer overflow in Bip 0.8.8 and earlier might allow remote authenticated users to execute arbitrary code via vectors involving a series of TCP connections that triggers use of many open file descriptors (CVE-2012-0806). Updated Packages: Mageia 1: bip-0.8.8-1.2.mga1 Mageia 2: bip-0.8.8-5.2.mga2 References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0806 http://www.debian.org/security/2012/dsa-2393 https://bugs.mageia.org/show_bug.cgi?id=4319 https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-...


(Log in to post comments)


Copyright © 2017, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds