---------------------------------------------------------------------- To improve our services to our customers, we have made a number of additions to the Secunia Advisories and have started translating the advisories to German. The improvements will help our customers to get a better understanding of how we reached our conclusions, how it was rated, our thoughts on exploitation, attack vectors, and scenarios. This includes: * Reason for rating * Extended description * Extended solution * Exploit code or links to exploit code * Deep links Read the full description: http://corporate.secunia.com/products/48/?r=l Contact Secunia Sales for more information: http://corporate.secunia.com/how_to_buy/15/?r=l ---------------------------------------------------------------------- TITLE: Mandriva update for imlib2 SECUNIA ADVISORY ID: SA22752 VERIFY ADVISORY: http://secunia.com/advisories/22752/ CRITICAL: Highly critical IMPACT: DoS, System access WHERE: >From remote OPERATING SYSTEM: Mandriva Linux 2007 http://secunia.com/product/12165/ Mandriva Linux 2006 http://secunia.com/product/9020/ DESCRIPTION: Mandriva has issued an update for imlib2. This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise an application using the library. For more information: SA22732 SOLUTION: Apply update packages. Mandriva Linux 2006 61a92ac496821d914751fe183b099263 2006.0/i586/imlib2-data-1.2.1-1.2.20060mdk.i586.rpm a0a74f3117aa9702068aae1c6e1f0215 2006.0/i586/libimlib2_1-1.2.1-1.2.20060mdk.i586.rpm 971783221a16e7afbd9b6142aab4de35 2006.0/i586/libimlib2_1-devel-1.2.1-1.2.20060mdk.i586.rpm 41b4415dfb63f51b6f5f980ef58f685f 2006.0/i586/libimlib2_1-filters-1.2.1-1.2.20060mdk.i586.rpm 69ad32ff42eeef614c23bb419a0eaf3e 2006.0/i586/libimlib2_1-loaders-1.2.1-1.2.20060mdk.i586.rpm 1188a1e19ae5d8563ae2a325d3ea987f 2006.0/SRPMS/imlib2-1.2.1-1.2.20060mdk.src.rpm Mandriva Linux 2006/X86_64 5a4980871ffe61c3882c41533c13b97a 2006.0/x86_64/imlib2-data-1.2.1-1.2.20060mdk.x86_64.rpm c4531cab09bd2e5d6653df5969f7981c 2006.0/x86_64/lib64imlib2_1-1.2.1-1.2.20060mdk.x86_64.rpm d7531e7c9c3620fa35b05d5415a9676b 2006.0/x86_64/lib64imlib2_1-devel-1.2.1-1.2.20060mdk.x86_64.rpm ff216ddb7de205c49faf18b9e435821c 2006.0/x86_64/lib64imlib2_1-filters-1.2.1-1.2.20060mdk.x86_64.rpm e669ec08c9fce8a583e28f29b28d9e66 2006.0/x86_64/lib64imlib2_1-loaders-1.2.1-1.2.20060mdk.x86_64.rpm 1188a1e19ae5d8563ae2a325d3ea987f 2006.0/SRPMS/imlib2-1.2.1-1.2.20060mdk.src.rpm Mandriva Linux 2007 adf7ed6fccaddac90171085ece7daf20 2007.0/i586/imlib2-data-1.2.2-3.1mdv2007.0.i586.rpm b03291bafed20868ba340925ff9ecef2 2007.0/i586/libimlib2_1-1.2.2-3.1mdv2007.0.i586.rpm 4cfd43e98f2866b5d57750f4f6c45663 2007.0/i586/libimlib2_1-devel-1.2.2-3.1mdv2007.0.i586.rpm 99231eaa46f95b43fbef8be44ee36193 2007.0/i586/libimlib2_1-filters-1.2.2-3.1mdv2007.0.i586.rpm 5ff7de44c82d49ebf5be654bf0effe50 2007.0/i586/libimlib2_1-loaders-1.2.2-3.1mdv2007.0.i586.rpm 99ad9ff6aaddce3d73bc8a47d2bb73ea 2007.0/SRPMS/imlib2-1.2.2-3.1mdv2007.0.src.rpm Mandriva Linux 2007/X86_64 604bf6917fd4413a204695fb65c15110 2007.0/x86_64/imlib2-data-1.2.2-3.1mdv2007.0.x86_64.rpm b3f8bb8fc561b4d0d48fb6b7640a3b84 2007.0/x86_64/lib64imlib2_1-1.2.2-3.1mdv2007.0.x86_64.rpm af12fa122091d2ccdafdd21416df3309 2007.0/x86_64/lib64imlib2_1-devel-1.2.2-3.1mdv2007.0.x86_64.rpm 85e4911818f812c2ddc99d3cf62f3df0 2007.0/x86_64/lib64imlib2_1-filters-1.2.2-3.1mdv2007.0.x86_64.rpm 0ed6d6cfe90315ca12405027f8031958 2007.0/x86_64/lib64imlib2_1-loaders-1.2.2-3.1mdv2007.0.x86_64.rpm 99ad9ff6aaddce3d73bc8a47d2bb73ea 2007.0/SRPMS/imlib2-1.2.2-3.1mdv2007.0.src.rpm ORIGINAL ADVISORY: http://www.mandriva.com/security/advisories?name=MDKSA-2006:198 OTHER REFERENCES: SA22732: http://secunia.com/advisories/22732/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------