[<prev] [next>] [day] [month] [year] [list]
Message-Id: <E1UPF16-0001t0-Bq@titan.mandriva.com>
Date: Mon, 08 Apr 2013 18:34:00 +0200
From: security@...driva.com
To: bugtraq@...urityfocus.com
Subject: [ MDVSA-2013:068 ] courier-authlib
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
_______________________________________________________________________
Mandriva Linux Security Advisory MDVSA-2013:068
http://www.mandriva.com/en/support/security/
_______________________________________________________________________
Package : courier-authlib
Date : April 8, 2013
Affected: Business Server 1.0
_______________________________________________________________________
Problem Description:
When using the authpgsql module and if the Postgres server goes down,
authpgsql will start leaking memory.
A packaging flaw was discovered that caused the courier-authlib-devel
package to be installed when installing for example maildrop.
This update fixes both of these issues.
_______________________________________________________________________
References:
https://wiki.mageia.org/en/Support/Advisories/MGAA-2012-0221
_______________________________________________________________________
Updated Packages:
Mandriva Business Server 1/X86_64:
98676dfdbd1b8befc2cd692877888798 mbs1/x86_64/courier-authdaemon-0.63.0-13.1.mbs1.x86_64.rpm
8dd9539fcfbad12522039d187f52c9be mbs1/x86_64/courier-authlib-0.63.0-13.1.mbs1.x86_64.rpm
fff848351845ee1073e97428ac42ab8b mbs1/x86_64/courier-authlib-devel-0.63.0-13.1.mbs1.x86_64.rpm
58f775ca498d2edb884a1c4815282520 mbs1/x86_64/courier-authlib-ldap-0.63.0-13.1.mbs1.x86_64.rpm
5d527b43316d35a277aef79e45d35e9b mbs1/x86_64/courier-authlib-mysql-0.63.0-13.1.mbs1.x86_64.rpm
afbd72fba8596eb895f2dfc817bbb2a7 mbs1/x86_64/courier-authlib-pgsql-0.63.0-13.1.mbs1.x86_64.rpm
426986883eb0a5fe4366c342ac8f7097 mbs1/x86_64/courier-authlib-userdb-0.63.0-13.1.mbs1.x86_64.rpm
13ab7b40c3519cccc620cd2b5548745a mbs1/SRPMS/courier-authlib-0.63.0-13.1.mbs1.src.rpm
_______________________________________________________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/en/support/security/advisories/
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
_______________________________________________________________________
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
iD8DBQFRYsdqmqjQ0CJFipgRAqrqAJ94wwkGNd390uVJ7BVpazybnr4BXACfcSxj
IqYdkTxCcaxss9KGh4SATg4=
=N83v
-----END PGP SIGNATURE-----
Powered by blists - more mailing lists