|
|
Subscribe / Log in / New account

Mageia alert MGASA-2012-0231 (apache-mod_authnz_external)

From:  Mageia Updates <buildsystem-daemon@mageia.org>
To:  updates-announce@ml.mageia.org
Subject:  [updates-announce] MGASA-2012-0231: apache-mod_authnz_external-3.2.5-3.1.mga1 (1/core), apache-mod_authnz_external-3.2.5-5.2.mga2 (2/core)
Date:  Tue, 21 Aug 2012 16:24:44 +0200
Message-ID:  <20120821142444.GA10831@valstar.mageia.org>

MGASA-2012-0231 Date: August 21st, 2012 Affected releases: 1, 2 Description: Updated apache-mod_authnz_external package fixes security vulnerability: SQL injection vulnerability in mysql/mysql-auth.pl in the mod_authnz_external module 3.2.5 and earlier for the Apache HTTP Server allows remote attackers to execute arbitrary SQL commands via the user field (CVE-2011-2688). Updated Packages: Mageia 1: apache-mod_authnz_external-3.2.5-3.1.mga1 Mageia 2: apache-mod_authnz_external-3.2.5-5.2.mga2 References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2688 http://www.debian.org/security/2011/dsa-2279 https://bugs.mageia.org/show_bug.cgi?id=7064 https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-...


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds