Mandriva 1271 Published by

The Mandriva Security Team published a new security update for Mandriva Linux. Here the announcement:



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDKSA-2006:115
http://www.mandriva.com/security/
_______________________________________________________________________

Package : mutt
Date : June 28, 2006
Affected: 10.2, 2006.0, Corporate 3.0
_______________________________________________________________________

Problem Description:

A stack-based buffer overflow in the browse_get_namespace function in
imap/browse.c of Mutt allows remote attackers to cause a denial of service
(crash) or execute arbitrary code via long namespaces received from the
IMAP server.

Updated packages have been patched to address this issue.
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?nameÊN-2006-3242
_______________________________________________________________________

Updated Packages:

Mandriva Linux 10.2:
4754ced22986cf85a1800f1505598e37 10.2/RPMS/mutt-1.5.6i-5.1.102mdk.i586.rpm
8821801bcfcd24e2c83a0650300ab3a6 10.2/RPMS/mutt-utf8-1.5.6i-5.1.102mdk.i586.rpm
013916fa3ad5714b2d54fbfebc226d2f 10.2/SRPMS/mutt-1.5.6i-5.1.102mdk.src.rpm

Mandriva Linux 10.2/X86_64:
3a92d59daad0f99898c19ee1ec3ab5c5 x86_64/10.2/RPMS/mutt-1.5.6i-5.1.102mdk.x86_64.rpm
45306ab4c8ee90b95f0590e859391118 x86_64/10.2/RPMS/mutt-utf8-1.5.6i-5.1.102mdk.x86_64.rpm
013916fa3ad5714b2d54fbfebc226d2f x86_64/10.2/SRPMS/mutt-1.5.6i-5.1.102mdk.src.rpm

Mandriva Linux 2006.0:
76aff600c45f2144b4cce08bf54bb27a 2006.0/RPMS/mutt-1.5.9i-9.1.20060mdk.i586.rpm
7e892d544ddfb5631bd299359b828ded 2006.0/RPMS/mutt-utf8-1.5.9i-9.1.20060mdk.i586.rpm
9e5067db02225e3b35ce9dbdfe17050d 2006.0/SRPMS/mutt-1.5.9i-9.1.20060mdk.src.rpm

Mandriva Linux 2006.0/X86_64:
7e6c0716940e1b9e19155d7af11bf1fa x86_64/2006.0/RPMS/mutt-1.5.9i-9.1.20060mdk.x86_64.rpm
f5315ffc0c03aa99fc7b106d4081e09d x86_64/2006.0/RPMS/mutt-utf8-1.5.9i-9.1.20060mdk.x86_64.rpm
9e5067db02225e3b35ce9dbdfe17050d x86_64/2006.0/SRPMS/mutt-1.5.9i-9.1.20060mdk.src.rpm

Corporate 3.0:
bfc81580fea8bc093ee286001dc9a90d corporate/3.0/RPMS/mutt-1.5.5.1i-2.1.C30mdk.i586.rpm
9979b1df2e7b70e801e362f1344cffdc corporate/3.0/RPMS/mutt-utf8-1.5.5.1i-2.1.C30mdk.i586.rpm
0b5f6bdc942633d280c44c6cf064f59f corporate/3.0/SRPMS/mutt-1.5.5.1i-2.1.C30mdk.src.rpm

Corporate 3.0/X86_64:
e6093d7bd4127c7d107894514c729f12 x86_64/corporate/3.0/RPMS/mutt-1.5.5.1i-2.1.C30mdk.x86_64.rpm
b6390789c46013fb8396d6cc9e2b18ac x86_64/corporate/3.0/RPMS/mutt-utf8-1.5.5.1i-2.1.C30mdk.x86_64.rpm
0b5f6bdc942633d280c44c6cf064f59f x86_64/corporate/3.0/SRPMS/mutt-1.5.5.1i-2.1.C30mdk.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.2 (GNU/Linux)

iD8DBQFEovkJmqjQ0CJFipgRAkhdAJ0ZglcrON2vkMd93rii6dW2wbrmqQCg9mq5
R/PHPisF3txjtylXIRNwUl0=
=nvnj
-----END PGP SIGNATURE-----