From Mageia wiki
Jump to: navigation, search

MGASA-2012-0155

Date: July 10th, 2012
Affected releases: 1, 2


Description:
Updated nut packages fix security vulnerability:

Buffer overflow in the addchar function in common/parseconf.c in upsd
in Network UPS Tools (NUT) before 2.6.4 allows remote attackers to
execute arbitrary code or cause a denial of service (electric-power
outage) via a long string containing non-printable characters
(CVE-2012-2944).


Updated Packages:
Mageia 1:
nut-2.6.0-2.1.mga1
nut-cgi-2.6.0-2.1.mga1
nut-devel-2.6.0-2.1.mga1
nut-drivers-hal-2.6.0-2.1.mga1
nut-server-2.6.0-2.1.mga1
lib(64)upsclient1-2.6.0-2.1.mga1

Mageia 2:
nut-2.6.1-1.1.mga2
nut-cgi-2.6.1-1.1.mga2
nut-devel-2.6.1-1.1.mga2
nut-drivers-hal-2.6.1-1.1.mga2
nut-server-2.6.1-1.1.mga2
lib(64)upsclient1-2.6.1-1.1.mga2


References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2944
http://www.mandriva.com/en/support/security/advisories/?dis=2010.1&name=MDVSA-2012:087
https://bugs.mageia.org/show_bug.cgi?id=6282