[<prev] [next>] [day] [month] [year] [list]
Message-Id: <E1HToOI-0002de-5W@artemis.annvix.ca>
Date: Tue, 20 Mar 2007 18:09:22 -0600
From: security@...driva.com
To: bugtraq@...urityfocus.com
Subject: [ MDKSA-2007:065 ] - Updated nas packages address multiple vulnerabilities
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
_______________________________________________________________________
Mandriva Linux Security Advisory MDKSA-2007:065
http://www.mandriva.com/security/
_______________________________________________________________________
Package : nas
Date : March 20, 2007
Affected: 2007.0
_______________________________________________________________________
Problem Description:
Luigi Auriemma discovered a number of problems with the nas (Network
Audio System) daemon that could be used to crash nasd.
Updated packages have been patched to address this issue.
_______________________________________________________________________
Updated Packages:
Mandriva Linux 2007.0:
cc58e73353eb07946526cbddff8ffbf2 2007.0/i586/libnas2-1.8-1.1mdv2007.0.i586.rpm
c6030170436a4e2d143e8941e8083a4d 2007.0/i586/libnas2-devel-1.8-1.1mdv2007.0.i586.rpm
87d3dd2650740544296040cc00336ef4 2007.0/i586/libnas2-static-devel-1.8-1.1mdv2007.0.i586.rpm
a5c9d2cbbc69a93d1a976a09928b255c 2007.0/i586/nas-1.8-1.1mdv2007.0.i586.rpm
8c5c4b41158d3edcca33fd6084df8b84 2007.0/SRPMS/nas-1.8-1.1mdv2007.0.src.rpm
Mandriva Linux 2007.0/X86_64:
ec28cf2a6b6a429a7c5debdd73d90861 2007.0/x86_64/lib64nas2-1.8-1.1mdv2007.0.x86_64.rpm
cf09ffe8692065c936393750e4cec030 2007.0/x86_64/lib64nas2-devel-1.8-1.1mdv2007.0.x86_64.rpm
7855b6a446d1e248a5fa311794e20da0 2007.0/x86_64/lib64nas2-static-devel-1.8-1.1mdv2007.0.x86_64.rpm
0d4bf3d345de9457ebe2fcf083314e48 2007.0/x86_64/nas-1.8-1.1mdv2007.0.x86_64.rpm
8c5c4b41158d3edcca33fd6084df8b84 2007.0/SRPMS/nas-1.8-1.1mdv2007.0.src.rpm
_______________________________________________________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
_______________________________________________________________________
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.7 (GNU/Linux)
iD8DBQFGAE1hmqjQ0CJFipgRAv+GAKCiZU7p825TBkhxGcKdR+YSovG/2gCfYzwO
wxBqyDCpYBlNHM4Bb/GUfoU=
=OC15
-----END PGP SIGNATURE-----
Powered by blists - more mailing lists