[<prev] [next>] [day] [month] [year] [list]
Message-Id: <E1Hj37e-0005D1-4D@artemis.annvix.ca>
Date: Tue, 01 May 2007 18:55:10 -0600
From: security@...driva.com
To: bugtraq@...urityfocus.com
Subject: [ MDKSA-2007:095 ] - Updated ktorrent packages fix vulnerability
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
_______________________________________________________________________
Mandriva Linux Security Advisory MDKSA-2007:095
http://www.mandriva.com/security/
_______________________________________________________________________
Package : ktorrent
Date : May 1, 2007
Affected: 2007.1
_______________________________________________________________________
Problem Description:
A directory traversal vulnerability was found in KTorrent prior to
2.1.2, due to an incomplete fix for a prior directory traversal
vulnerability that was corrected in version 2.1.2. Previously,
KTorrent would only check for the string .., which could permit
strings such as ../.
Updated packages have been patched to correct this issue.
_______________________________________________________________________
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1799
_______________________________________________________________________
Updated Packages:
Mandriva Linux 2007.1:
b95f63a9b094263407b5edd9fe7ee6e2 2007.1/i586/ktorrent-2.1.2-2.1mdv2007.1.i586.rpm
32512bebd21d579d2fa762c387e8efda 2007.1/i586/libktorrent2.1.2-2.1.2-2.1mdv2007.1.i586.rpm
151fe82f8fa9c1a3bb568d96ee098e08 2007.1/SRPMS/ktorrent-2.1.2-2.1mdv2007.1.src.rpm
Mandriva Linux 2007.1/X86_64:
545b1f969612aa961e48133c18cbb12f 2007.1/x86_64/ktorrent-2.1.2-2.1mdv2007.1.x86_64.rpm
5fa55787f9f581f79ade2254613222dd 2007.1/x86_64/lib64ktorrent2.1.2-2.1.2-2.1mdv2007.1.x86_64.rpm
151fe82f8fa9c1a3bb568d96ee098e08 2007.1/SRPMS/ktorrent-2.1.2-2.1mdv2007.1.src.rpm
_______________________________________________________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
_______________________________________________________________________
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.7 (GNU/Linux)
iD8DBQFGN7c5mqjQ0CJFipgRAkY2AJ48jJB5PXsV8NIceC7oIfg1HXj4TACeL1Vl
UzHP4k6ff8EBveLVBVzQ7Uw=
=wLFJ
-----END PGP SIGNATURE-----
Powered by blists - more mailing lists