lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-Id: <E1HToOI-0002di-7Y@artemis.annvix.ca>
Date: Tue, 20 Mar 2007 18:09:22 -0600
From: security@...driva.com
To: full-disclosure@...ts.grok.org.uk
Subject: [ MDKSA-2007:065 ] - Updated nas packages address
	multiple vulnerabilities


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________
 
 Mandriva Linux Security Advisory                         MDKSA-2007:065
 http://www.mandriva.com/security/
 _______________________________________________________________________
 
 Package : nas
 Date    : March 20, 2007
 Affected: 2007.0
 _______________________________________________________________________
 
 Problem Description:
 
 Luigi Auriemma discovered a number of problems with the nas (Network
 Audio System) daemon that could be used to crash nasd.
 
 Updated packages have been patched to address this issue.
 _______________________________________________________________________

 Updated Packages:
 
 Mandriva Linux 2007.0:
 cc58e73353eb07946526cbddff8ffbf2  2007.0/i586/libnas2-1.8-1.1mdv2007.0.i586.rpm
 c6030170436a4e2d143e8941e8083a4d  2007.0/i586/libnas2-devel-1.8-1.1mdv2007.0.i586.rpm
 87d3dd2650740544296040cc00336ef4  2007.0/i586/libnas2-static-devel-1.8-1.1mdv2007.0.i586.rpm
 a5c9d2cbbc69a93d1a976a09928b255c  2007.0/i586/nas-1.8-1.1mdv2007.0.i586.rpm 
 8c5c4b41158d3edcca33fd6084df8b84  2007.0/SRPMS/nas-1.8-1.1mdv2007.0.src.rpm

 Mandriva Linux 2007.0/X86_64:
 ec28cf2a6b6a429a7c5debdd73d90861  2007.0/x86_64/lib64nas2-1.8-1.1mdv2007.0.x86_64.rpm
 cf09ffe8692065c936393750e4cec030  2007.0/x86_64/lib64nas2-devel-1.8-1.1mdv2007.0.x86_64.rpm
 7855b6a446d1e248a5fa311794e20da0  2007.0/x86_64/lib64nas2-static-devel-1.8-1.1mdv2007.0.x86_64.rpm
 0d4bf3d345de9457ebe2fcf083314e48  2007.0/x86_64/nas-1.8-1.1mdv2007.0.x86_64.rpm 
 8c5c4b41158d3edcca33fd6084df8b84  2007.0/SRPMS/nas-1.8-1.1mdv2007.0.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  <security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.7 (GNU/Linux)

iD8DBQFGAE1hmqjQ0CJFipgRAv+GAKCiZU7p825TBkhxGcKdR+YSovG/2gCfYzwO
wxBqyDCpYBlNHM4Bb/GUfoU=
=OC15
-----END PGP SIGNATURE-----

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ