Advisories
Mandriva Advisories
|
![]() |
Problem Description |
A buffer overflow exists in versions of the slrn news reader prior to
0.9.6.3pl4 as reported by Bill Nottingham. This problem exists in the
wrapping/unwrapping functions and a long header in a message might
overflow a buffer which could result in execution of arbitrary code
encoded in the message.
Updated Packages |
Mandrakelinux 6.0
68f4a5c6b21ba400ade01fd2f3757f2d 6.0/RPMS/slrn-0.9.6.3-10.2mdk.i586.rpm fcfe71e53bc18e43a9ea9040994cea98 6.0/RPMS/slrn-pull-0.9.6.3-10.2mdk.i586.rpm d1039550f9bf9c182763d42cf5e1fb3f 6.0/SRPMS/slrn-0.9.6.3-10.2mdk.src.rpm
Mandrakelinux 6.1
1ce3e48d3eced83245e330270128a502 6.1/RPMS/slrn-0.9.6.3-10.2mdk.i586.rpm cd0253b5c565f71febf5c3cd6042de43 6.1/RPMS/slrn-pull-0.9.6.3-10.2mdk.i586.rpm d1039550f9bf9c182763d42cf5e1fb3f 6.1/SRPMS/slrn-0.9.6.3-10.2mdk.src.rpm
Mandrakelinux 7.0
dd3ce4674f8f24c868d12c7c836a446b 7.0/RPMS/slrn-0.9.6.3-10.2mdk.i586.rpm fd20752ecb1c5afb88c0061f9d52c6b5 7.0/RPMS/slrn-pull-0.9.6.3-10.2mdk.i586.rpm d1039550f9bf9c182763d42cf5e1fb3f 7.0/SRPMS/slrn-0.9.6.3-10.2mdk.src.rpm
Mandrakelinux 7.1
d3df413eed6ef64e3c6c22fdb4f38a94 7.1/RPMS/slrn-0.9.6.3-10.2mdk.i586.rpm dec7104c3dd114b383b68f175dc4f89c 7.1/RPMS/slrn-pull-0.9.6.3-10.2mdk.i586.rpm d1039550f9bf9c182763d42cf5e1fb3f 7.1/SRPMS/slrn-0.9.6.3-10.2mdk.src.rpm
Mandrakelinux 7.2
066daea1a7142cc2acce05b73364cd7b 7.2/RPMS/slrn-0.9.6.3-10.1mdk.i586.rpm defa4b8904486fa8c83a7dc377ec3e00 7.2/RPMS/slrn-pull-0.9.6.3-10.1mdk.i586.rpm 0f6e7c6eefcbaae3eddd60b03e05f552 7.2/SRPMS/slrn-0.9.6.3-10.1mdk.src.rpm
Corporate Server 1.0.1
d3df413eed6ef64e3c6c22fdb4f38a94 1.0.1/RPMS/slrn-0.9.6.3-10.2mdk.i586.rpm dec7104c3dd114b383b68f175dc4f89c 1.0.1/RPMS/slrn-pull-0.9.6.3-10.2mdk.i586.rpm d1039550f9bf9c182763d42cf5e1fb3f 1.0.1/SRPMS/slrn-0.9.6.3-10.2mdk.src.rpm
Upgrade |
To upgrade automatically, use MandrivaUpdate.
Verification |
Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command :
rpm --checksig package.rpm
You can get the GPG public key of the Mandriva Security Team to verify the GPG signature of each RPM.
If you use MandrivaUpdate, the verification of md5 checksum and GPG signature is performed automatically for you.