Mandriva Linux Security Advisory 2009-208 - libgadu before 1.8.2 allows remote servers to cause a denial of service (crash) via a contact description with a large length, which triggers a buffer over-read. This update provides a solution to this vulnerability.
83a5ca9356239d87e4ee7b67aae57b4f6ad8215675c0a25f01e285653678684e
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
_______________________________________________________________________
Mandriva Linux Security Advisory MDVSA-2009:208
http://www.mandriva.com/security/
_______________________________________________________________________
Package : libgadu
Date : August 20, 2009
Affected: 2008.1, 2009.0, Enterprise Server 5.0
_______________________________________________________________________
Problem Description:
A vulnerability has been found and corrected in libgadu:
libgadu before 1.8.2 allows remote servers to cause a denial of service
(crash) via a contact description with a large length, which triggers
a buffer over-read (CVE-2008-4776).
This update provides a solution to this vulnerability.
_______________________________________________________________________
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-4776
_______________________________________________________________________
Updated Packages:
Mandriva Linux 2008.1:
1c0af6f00f073390ff69e6844394b813 2008.1/i586/libgadu3-1.8.0-1.1mdv2008.1.i586.rpm
6d6fc79f0f8ea9deaa79f67013be103b 2008.1/i586/libgadu-devel-1.8.0-1.1mdv2008.1.i586.rpm
1a9d6c02ec1b2683253d1058f6a52ffc 2008.1/SRPMS/libgadu-1.8.0-1.1mdv2008.1.src.rpm
Mandriva Linux 2008.1/X86_64:
673242fd7da029005a1fdcea295fe576 2008.1/x86_64/lib64gadu3-1.8.0-1.1mdv2008.1.x86_64.rpm
5fe5265aa0a7f2a767b6b63d3dc4a00e 2008.1/x86_64/lib64gadu-devel-1.8.0-1.1mdv2008.1.x86_64.rpm
1a9d6c02ec1b2683253d1058f6a52ffc 2008.1/SRPMS/libgadu-1.8.0-1.1mdv2008.1.src.rpm
Mandriva Linux 2009.0:
a1c0c94b882c442897074c473bd7c432 2009.0/i586/libgadu3-1.8.1-2.1mdv2009.0.i586.rpm
27f122bbc778314bc59f929f5efc4bd9 2009.0/i586/libgadu-devel-1.8.1-2.1mdv2009.0.i586.rpm
4e46ebf53c466e5afc61f740db59ef1e 2009.0/SRPMS/libgadu-1.8.1-2.1mdv2009.0.src.rpm
Mandriva Linux 2009.0/X86_64:
d163436eefbc29409fb42289596f8ea9 2009.0/x86_64/lib64gadu3-1.8.1-2.1mdv2009.0.x86_64.rpm
19bd5071b0ba3a348e846d177b5952eb 2009.0/x86_64/lib64gadu-devel-1.8.1-2.1mdv2009.0.x86_64.rpm
4e46ebf53c466e5afc61f740db59ef1e 2009.0/SRPMS/libgadu-1.8.1-2.1mdv2009.0.src.rpm
Mandriva Enterprise Server 5:
8618cf0c0b55a33249f2551b4c1cd2a8 mes5/i586/libgadu3-1.8.1-2.1mdvmes5.i586.rpm
f5507588a57548cb6215b64c0e05a9da mes5/i586/libgadu-devel-1.8.1-2.1mdvmes5.i586.rpm
343437290b1c8e4204d19fa3248f2388 mes5/SRPMS/libgadu-1.8.1-2.1mdvmes5.src.rpm
Mandriva Enterprise Server 5/X86_64:
895a408fecee913966d93b26175edae3 mes5/x86_64/lib64gadu3-1.8.1-2.1mdvmes5.x86_64.rpm
f76383153c792fd9fd4f3cd149d9aa83 mes5/x86_64/lib64gadu-devel-1.8.1-2.1mdvmes5.x86_64.rpm
343437290b1c8e4204d19fa3248f2388 mes5/SRPMS/libgadu-1.8.1-2.1mdvmes5.src.rpm
_______________________________________________________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/security/advisories
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
_______________________________________________________________________
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
iD8DBQFKjVyQmqjQ0CJFipgRAsv2AKCoSFfc++y+Vn28wQTz8d5KS8yu5QCg33TN
39RyhVm7nN1ECwka+QoksSs=
=B9vQ
-----END PGP SIGNATURE-----