Mageia alert MGASA-2012-0155 (nut)
| From: | Mageia Updates <buildsystem-daemon@mageia.org> | |
| To: | updates-announce@ml.mageia.org | |
| Subject: | [updates-announce] MGASA-2012-0155: nut-2.6.0-2.1.mga1 (1/core), nut-2.6.1-1.1.mga2 (2/core) | |
| Date: | Tue, 10 Jul 2012 13:39:03 +0200 | |
| Message-ID: | <20120710113903.GA22284@valstar.mageia.org> |
MGASA-2012-0155 Date: July 10th, 2012 Affected releases: 1, 2 Description: Updated nut packages fix security vulnerability: Buffer overflow in the addchar function in common/parseconf.c in upsd in Network UPS Tools (NUT) before 2.6.4 allows remote attackers to execute arbitrary code or cause a denial of service (electric-power outage) via a long string containing non-printable characters (CVE-2012-2944). Updated Packages: Mageia 1: nut-2.6.0-2.1.mga1 nut-cgi-2.6.0-2.1.mga1 nut-devel-2.6.0-2.1.mga1 nut-drivers-hal-2.6.0-2.1.mga1 nut-server-2.6.0-2.1.mga1 lib(64)upsclient1-2.6.0-2.1.mga1 Mageia 2: nut-2.6.1-1.1.mga2 nut-cgi-2.6.1-1.1.mga2 nut-devel-2.6.1-1.1.mga2 nut-drivers-hal-2.6.1-1.1.mga2 nut-server-2.6.1-1.1.mga2 lib(64)upsclient1-2.6.1-1.1.mga2 References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2944 http://www.mandriva.com/en/support/security/advisories/?d... https://bugs.mageia.org/show_bug.cgi?id=6282 https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-...
