Mandriva 1271 Published by

The Mandriva Security Team published a new security update for Mandriva Linux. Here the announcement:



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDKSA-2006:135
http://www.mandriva.com/security/
_______________________________________________________________________

Package : freeciv
Date : July 31, 2006
Affected: 2006.0
_______________________________________________________________________

Problem Description:

Buffer overflow in Freeciv 2.1.0-beta1 and earlier, and SVN 15 Jul
2006 and earlier, allows remote attackers to cause a denial of service
(crash) and possibly execute arbitrary code via a (1) negative
chunk_length or a (2) large chunk->offset value in a
PACKET_PLAYER_ATTRIBUTE_CHUNK packet in the
generic_handle_player_attribute_chunk function in common/packets.c, and
(3) a large packet->length value in the handle_unit_orders function in
server/unithand.c.

The updated packages have been patched to fix this issue.
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3913
_______________________________________________________________________

Updated Packages:

Mandriva Linux 2006.0:
5ddab58ab94283b8c4398875a2a845de 2006.0/RPMS/freeciv-client-2.0.4-2.2.20060mdk.i586.rpm
218f597230b3435da9a41a6cc1f27826 2006.0/RPMS/freeciv-data-2.0.4-2.2.20060mdk.i586.rpm
ee661fb04809a50f893342ac350dfc3f 2006.0/RPMS/freeciv-server-2.0.4-2.2.20060mdk.i586.rpm
73be75ec52570bc9a58eed1f94916135 2006.0/SRPMS/freeciv-2.0.4-2.2.20060mdk.src.rpm

Mandriva Linux 2006.0/X86_64:
5c0a814a9abb1d374837141815fccb7a x86_64/2006.0/RPMS/freeciv-client-2.0.4-2.2.20060mdk.x86_64.rpm
454360b2ce12207760c7e4325c8e5c3f x86_64/2006.0/RPMS/freeciv-data-2.0.4-2.2.20060mdk.x86_64.rpm
dea806eb51d3c13f893a3adcd9866f85 x86_64/2006.0/RPMS/freeciv-server-2.0.4-2.2.20060mdk.x86_64.rpm
73be75ec52570bc9a58eed1f94916135 x86_64/2006.0/SRPMS/freeciv-2.0.4-2.2.20060mdk.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/security/advisories

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.2 (GNU/Linux)

iD8DBQFEznysmqjQ0CJFipgRAjD2AKC20vpTIzWQxLfI4767y0nj3kX7wACgtcmX
FQ9c69ztrNPZxtCiNA6Z6hg=
=H1PR
-----END PGP SIGNATURE-----