---------------------------------------------------------------------- A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI has been released. The new version includes many new and advanced features, which makes it even easier to stay patched. Download and test it today: https://psi.secunia.com/ Read more about this new version: https://psi.secunia.com/?page=changelog ---------------------------------------------------------------------- TITLE: Mandriva update for gcc SECUNIA ADVISORY ID: SA29334 VERIFY ADVISORY: http://secunia.com/advisories/29334/ CRITICAL: Less critical IMPACT: System access WHERE: >From remote OPERATING SYSTEM: Mandriva Linux 2007.0 http://secunia.com/product/12165/ DESCRIPTION: Mandriva has issued an update for gcc. This fixes a vulnerability, which potentially can be exploited by malicious people to compromise a vulnerable system. For more information: SA21100 SOLUTION: Apply updated packages. Mandriva Linux 2007 58c6cf8d35ddfc777fbd48d2417d3bf6 2007.0/i586/gcc-4.1.1-3.1mdv2007.0.i586.rpm 6d9975dc6f9fc193ee36cfe175646522 2007.0/i586/gcc-c++-4.1.1-3.1mdv2007.0.i586.rpm 92e7130f0779f2b5d242599c72e21a93 2007.0/i586/gcc-colorgcc-4.1.1-3.1mdv2007.0.i586.rpm bc1f9e4d70a6eca97195e7e426d94eb7 2007.0/i586/gcc-cpp-4.1.1-3.1mdv2007.0.i586.rpm 6a5d27006f95561eca088efa3ac8a43c 2007.0/i586/gcc-doc-4.1.1-3.1mdv2007.0.i586.rpm a6c61ac7709a9fd1dd1e4a871ea99043 2007.0/i586/gcc-doc-pdf-4.1.1-3.1mdv2007.0.i586.rpm 69312eed7668db205af979c3df66a318 2007.0/i586/gcc-gfortran-4.1.1-3.1mdv2007.0.i586.rpm 240b78599ebd782ada402dd8ac07cb4e 2007.0/i586/gcc-gnat-4.1.1-3.1mdv2007.0.i586.rpm 8c08be739f5bc62d48f6888adfce5371 2007.0/i586/gcc-java-4.1.1-3.1mdv2007.0.i586.rpm 0dcfb85325bcf952ce33677b75270da2 2007.0/i586/gcc-objc++-4.1.1-3.1mdv2007.0.i586.rpm dbedcd1fd07ab61450e68b0eda6be51a 2007.0/i586/gcc-objc-4.1.1-3.1mdv2007.0.i586.rpm 324c0689a68357d62c234cc5dadd38fb 2007.0/i586/gcj-tools-4.1.1-3.1mdv2007.0.i586.rpm 48ba63b8112c0959d9084efa472afa93 2007.0/i586/libffi4-devel-4.1.1-3.1mdv2007.0.i586.rpm 73889bab4e0d796bdc071d626967d418 2007.0/i586/libgcc1-4.1.1-3.1mdv2007.0.i586.rpm dd051e85774c000f0df1bed25acadd8d 2007.0/i586/libgcj7-4.1.1-3.1mdv2007.0.i586.rpm 2b64429673e3d7885c543869eed39405 2007.0/i586/libgcj7-base-4.1.1-3.1mdv2007.0.i586.rpm 6dafdb898c7062c867957f1ef88cca09 2007.0/i586/libgcj7-devel-4.1.1-3.1mdv2007.0.i586.rpm 405a024b5f35c6d5c4e5287e3d26b5e8 2007.0/i586/libgcj7-src-4.1.1-3.1mdv2007.0.i586.rpm 7cdf5c5b02558d05b905111013f93034 2007.0/i586/libgcj7-static-devel-4.1.1-3.1mdv2007.0.i586.rpm 782c84424be93b36c234726794115cb1 2007.0/i586/libgfortran1-4.1.1-3.1mdv2007.0.i586.rpm ebc2f4a242f6acdc0e31ff9c21c1aa49 2007.0/i586/libgnat1-4.1.1-3.1mdv2007.0.i586.rpm f3c06182f6d16414c0fa5df6ccde3a82 2007.0/i586/libmudflap0-4.1.1-3.1mdv2007.0.i586.rpm 8ece89f2404ebf1fe97b634400892184 2007.0/i586/libmudflap0-devel-4.1.1-3.1mdv2007.0.i586.rpm 5f960e7ff38589a750b5cbc5a5c6faee 2007.0/i586/libobjc1-4.1.1-3.1mdv2007.0.i586.rpm 5474e6e7cc1c4be77ac5b5727e33f201 2007.0/i586/libstdc++6-4.1.1-3.1mdv2007.0.i586.rpm 95abfd3cf0626c9f577c692d657fbe0c 2007.0/i586/libstdc++6-devel-4.1.1-3.1mdv2007.0.i586.rpm 5b3cf2d98f4fa41287ea01b2d2322049 2007.0/i586/libstdc++6-static-devel-4.1.1-3.1mdv2007.0.i586.rpm 1967b73c1d60f91830d851b9fecb3d64 2007.0/SRPMS/gcc-4.1.1-3.1mdv2007.0.src.rpm Mandriva Linux 2007/X86_64 b33ecc48e1cf4d309c7b0f876cb37885 2007.0/x86_64/gcc-4.1.1-3.1mdv2007.0.x86_64.rpm d1ea79d8d432bf5b35c9fa9dbf417d0d 2007.0/x86_64/gcc-c++-4.1.1-3.1mdv2007.0.x86_64.rpm 6a398f2eef7cdaf45f9ac3aaeb95c4a9 2007.0/x86_64/gcc-colorgcc-4.1.1-3.1mdv2007.0.x86_64.rpm 84431e6af6d9da3d507b02560aea568e 2007.0/x86_64/gcc-cpp-4.1.1-3.1mdv2007.0.x86_64.rpm 6bf42856478b49d87ed3e6752934b27c 2007.0/x86_64/gcc-doc-4.1.1-3.1mdv2007.0.x86_64.rpm de12ae62fcd46bf0df204c3422081efd 2007.0/x86_64/gcc-doc-pdf-4.1.1-3.1mdv2007.0.x86_64.rpm fd633b5c4abb1e754228b2bc5fbf8d75 2007.0/x86_64/gcc-gfortran-4.1.1-3.1mdv2007.0.x86_64.rpm 1b4464e3ba008428d4cc5ce41ae368e6 2007.0/x86_64/gcc-gnat-4.1.1-3.1mdv2007.0.x86_64.rpm d4ac67158a0885fcf731d974450d4b21 2007.0/x86_64/gcc-java-4.1.1-3.1mdv2007.0.x86_64.rpm fc9ae07d8c9ef022dc06f1431b1cadc7 2007.0/x86_64/gcc-objc++-4.1.1-3.1mdv2007.0.x86_64.rpm af539cfedcf8223ddf4e98e86b492eb5 2007.0/x86_64/gcc-objc-4.1.1-3.1mdv2007.0.x86_64.rpm 78d4d268e34a928466087f8a8906d2e1 2007.0/x86_64/gcj-tools-4.1.1-3.1mdv2007.0.x86_64.rpm 13c4aafdea212b2a9071d2cb1648cf8a 2007.0/x86_64/lib64gcj7-4.1.1-3.1mdv2007.0.x86_64.rpm 18ea5d2ac44c333d985492a4b934fd73 2007.0/x86_64/lib64gcj7-devel-4.1.1-3.1mdv2007.0.x86_64.rpm d3f803e71c7bfc82e17336017d76097b 2007.0/x86_64/lib64gcj7-static-devel-4.1.1-3.1mdv2007.0.x86_64.rpm 14d84d366443c1e8353b254b835c57c1 2007.0/x86_64/libffi4-devel-4.1.1-3.1mdv2007.0.x86_64.rpm 4a4d4796287df8ffc0700ff25a3bb72c 2007.0/x86_64/libgcc1-4.1.1-3.1mdv2007.0.x86_64.rpm 16a22a4759afe854c1bb70c02ab640a0 2007.0/x86_64/libgcj7-base-4.1.1-3.1mdv2007.0.x86_64.rpm 4673d109b440a106a4c28e4f7c14c38c 2007.0/x86_64/libgcj7-src-4.1.1-3.1mdv2007.0.x86_64.rpm 931acf8beefcfc94fa74bdb9a2fb6741 2007.0/x86_64/libgfortran1-4.1.1-3.1mdv2007.0.x86_64.rpm cd831140795f935e7aeb836a01b1d9d4 2007.0/x86_64/libgnat1-4.1.1-3.1mdv2007.0.x86_64.rpm aa0461fcd5a1ca7d9b35388625c1d2df 2007.0/x86_64/libmudflap0-4.1.1-3.1mdv2007.0.x86_64.rpm eaaa60ca6d94ccbaa2605e81f33fb8d0 2007.0/x86_64/libmudflap0-devel-4.1.1-3.1mdv2007.0.x86_64.rpm 1f45d52012522d91b36897dd8a081220 2007.0/x86_64/libobjc1-4.1.1-3.1mdv2007.0.x86_64.rpm a96b744f79ae638f855af803a27ddc9b 2007.0/x86_64/libstdc++6-4.1.1-3.1mdv2007.0.x86_64.rpm 31c25bb155dc6e0e3da4ff34778fcd4b 2007.0/x86_64/libstdc++6-devel-4.1.1-3.1mdv2007.0.x86_64.rpm 70d8b145f369afee787299716a787bc1 2007.0/x86_64/libstdc++6-static-devel-4.1.1-3.1mdv2007.0.x86_64.rpm 1967b73c1d60f91830d851b9fecb3d64 2007.0/SRPMS/gcc-4.1.1-3.1mdv2007.0.src.rpm ORIGINAL ADVISORY: http://www.mandriva.com/en/security/advisories?name=MDVSA-2008:066 OTHER REFERENCES: SA21100: http://secunia.com/advisories/21100/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------