|
|
Subscribe / Log in / New account

Mageia alert MGASA-2012-0209 (gypsy)

From:  Mageia Updates <buildsystem-daemon@mageia.org>
To:  updates-announce@ml.mageia.org
Subject:  [updates-announce] MGASA-2012-0209: gypsy-0.8-2.1.mga (1, 2/core)
Date:  Sun, 12 Aug 2012 20:33:51 +0200
Message-ID:  <20120812183351.GA11075@valstar.mageia.org>

MGASA-2012-0209 Date: August 12th, 2012 Affected releases: 1, 2 Description: Updated gypsy packages fix security vulnerabilities: Regular users can request that arbitrary files be opened for reading. In the best case, this is a denial of service. Worst-case, this could lead to information disclosure or privilege escalation (CVE-2011-0523). Unchecked buffer overflows as well in gps_channel_garmin_input() via nmeabuf and nmea_gpgsv(), which could be used in an attack (CVE-2011-0524). Note: a new config file, /etc/gypsy.conf, has been added that specifies a whitelist of globs. By default, they are "/dev/tty*", "/dev/pgps", and "bluetooth" (which matches Bluetooth addresses) Updated Packages: Mageia 1: gypsy-0.8-2.1.mga1 gypsy-devel-0.8-2.1.mga1 gypsy-docs-0.8-2.1.mga1 lib(64)gypsy0-0.8-2.1.mga1 Mageia 2: gypsy-0.8-2.1.mga2 gypsy-devel-0.8-2.1.mga2 gypsy-docs-0.8-2.1.mga2 lib(64)gypsy0-0.8-2.1.mga2 References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0523 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0524 https://bugs.launchpad.net/ubuntu/+source/gypsy/+bug/690323 http://lists.opensuse.org/opensuse-updates/2012-07/msg000... https://bugs.mageia.org/show_bug.cgi?id=6808 https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-...


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds