Advisories
Mandriva Advisories
|
![]() |
Problem Description |
Tavis Ormandy, of the Google Security Team, discovered that ncompress,
when uncompressing data, performed no bounds checking, which could
allow a specially crafted datastream to underflow a .bss buffer with
attacker controlled data.
Updated packages have been patched to correct this issue.
Updated Packages |
Corporate Server 3.0
30ecc6154bc75783218b82961288b085 corporate/3.0/RPMS/ncompress-4.2.4-28.1.C30mdk.i586.rpm bda272f060534aa25bebf22ed852f647 corporate/3.0/SRPMS/ncompress-4.2.4-28.1.C30mdk.src.rpm
Corporate Server 3.0/X86_64
c9340a5c9bea0316f31fc61f6916f192 x86_64/corporate/3.0/RPMS/ncompress-4.2.4-28.1.C30mdk.x86_64.rpm bda272f060534aa25bebf22ed852f647 x86_64/corporate/3.0/SRPMS/ncompress-4.2.4-28.1.C30mdk.src.rpm
Mandriva Linux 2006
a1e4fe7d74a1c8e043beb83baec7b34b 2006.0/RPMS/ncompress-4.2.4-28.1.20060mdk.i586.rpm 4b87e1b5ba659ce410067b09a75d669e 2006.0/SRPMS/ncompress-4.2.4-28.1.20060mdk.src.rpm
Mandriva Linux 2006/X86_64
7ce7f3a618b9c3687936145e2563733a x86_64/2006.0/RPMS/ncompress-4.2.4-28.1.20060mdk.x86_64.rpm 4b87e1b5ba659ce410067b09a75d669e x86_64/2006.0/SRPMS/ncompress-4.2.4-28.1.20060mdk.src.rpm
References |
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-1168
Upgrade |
To upgrade automatically, use MandrivaUpdate.
Verification |
Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command :
rpm --checksig package.rpm
You can get the GPG public key of the Mandriva Security Team to verify the GPG signature of each RPM.
If you use MandrivaUpdate, the verification of md5 checksum and GPG signature is performed automatically for you.