|
|
Subscribe / Log in / New account

Mageia alert MGASA-2012-0155 (nut)

From:  Mageia Updates <buildsystem-daemon@mageia.org>
To:  updates-announce@ml.mageia.org
Subject:  [updates-announce] MGASA-2012-0155: nut-2.6.0-2.1.mga1 (1/core), nut-2.6.1-1.1.mga2 (2/core)
Date:  Tue, 10 Jul 2012 13:39:03 +0200
Message-ID:  <20120710113903.GA22284@valstar.mageia.org>

MGASA-2012-0155 Date: July 10th, 2012 Affected releases: 1, 2 Description: Updated nut packages fix security vulnerability: Buffer overflow in the addchar function in common/parseconf.c in upsd in Network UPS Tools (NUT) before 2.6.4 allows remote attackers to execute arbitrary code or cause a denial of service (electric-power outage) via a long string containing non-printable characters (CVE-2012-2944). Updated Packages: Mageia 1: nut-2.6.0-2.1.mga1 nut-cgi-2.6.0-2.1.mga1 nut-devel-2.6.0-2.1.mga1 nut-drivers-hal-2.6.0-2.1.mga1 nut-server-2.6.0-2.1.mga1 lib(64)upsclient1-2.6.0-2.1.mga1 Mageia 2: nut-2.6.1-1.1.mga2 nut-cgi-2.6.1-1.1.mga2 nut-devel-2.6.1-1.1.mga2 nut-drivers-hal-2.6.1-1.1.mga2 nut-server-2.6.1-1.1.mga2 lib(64)upsclient1-2.6.1-1.1.mga2 References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2944 http://www.mandriva.com/en/support/security/advisories/?d... https://bugs.mageia.org/show_bug.cgi?id=6282 https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-...


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds