Mageia alert MGASA-2016-0328 (zookeeper)
From: | Mageia Updates <buildsystem-daemon@mageia.org> | |
To: | updates-announce@ml.mageia.org | |
Subject: | [updates-announce] MGASA-2016-0328: Updated zookeeper packages fix security vulnerability | |
Date: | Wed, 28 Sep 2016 07:59:58 +0200 | |
Message-ID: | <20160928055958.66BC59F793@duvel.mageia.org> |
MGASA-2016-0328 - Updated zookeeper packages fix security vulnerability Publication date: 28 Sep 2016 URL: http://advisories.mageia.org/MGASA-2016-0328.html Type: security Affected Mageia releases: 5 CVE: CVE-2016-5017 Description: Lyon Yang discovered that the C client shells cli_st and cli_mt of Apache Zookeeper were affected by a buffer overflow vulnerability associated with parsing of the input command when using the "cmd:" batch mode syntax. If the command string exceeds 1024 characters a buffer overflow will occur (CVE-2016-5017). References: - https://bugs.mageia.org/show_bug.cgi?id=19419 - http://lwn.net/Alerts/701123/ - http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-5017 SRPMS: - 5/core/zookeeper-3.4.5-25.1.mga5