---------------------------------------------------------------------- To improve our services to our customers, we have made a number of additions to the Secunia Advisories and have started translating the advisories to German. The improvements will help our customers to get a better understanding of how we reached our conclusions, how it was rated, our thoughts on exploitation, attack vectors, and scenarios. This includes: * Reason for rating * Extended description * Extended solution * Exploit code or links to exploit code * Deep links Read the full description: http://corporate.secunia.com/products/48/?r=l Contact Secunia Sales for more information: http://corporate.secunia.com/how_to_buy/15/?r=l ---------------------------------------------------------------------- TITLE: Mandriva update for librpm4 SECUNIA ADVISORY ID: SA22768 VERIFY ADVISORY: http://secunia.com/advisories/22768/ CRITICAL: Less critical IMPACT: DoS, System access WHERE: >From remote OPERATING SYSTEM: Mandriva Linux 2006 http://secunia.com/product/9020/ Mandriva Linux 2007 http://secunia.com/product/12165/ DESCRIPTION: Mandriva has issued an update for librpm4. This fixes a vulnerability which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise a vulnerable system. For more information: SA22740 SOLUTION: Apply updated packages: Mandriva Linux 2006 b3fe19c583086bcbe6fe1adf8ebd67f9 2006.0/i586/libpopt0-1.10.2-4.1.20060mdk.i586.rpm a299990527f43947f04ee849b6ccfe8a 2006.0/i586/libpopt0-devel-1.10.2-4.1.20060mdk.i586.rpm 530ffd2b719a8a9565ddbd33c73ddc58 2006.0/i586/librpm4.4-4.4.2-4.1.20060mdk.i586.rpm 52cfd81dc7b1edf2a37a2f473281a456 2006.0/i586/librpm4.4-devel-4.4.2-4.1.20060mdk.i586.rpm 263429da4f90f2404c7d45f4ed9ab469 2006.0/i586/popt-data-1.10.2-4.1.20060mdk.i586.rpm 32f2ab6511b34c2483fe08ca510ee185 2006.0/i586/python-rpm-4.4.2-4.1.20060mdk.i586.rpm 0e1f62683fbc9233fb155e66e50cd405 2006.0/i586/rpm-4.4.2-4.1.20060mdk.i586.rpm f8dee8f612d28cdc5a9587289ddbbdd9 2006.0/i586/rpm-build-4.4.2-4.1.20060mdk.i586.rpm 5f7eb369ce3e98bf38200249f49ebc51 2006.0/SRPMS/rpm-4.4.2-4.1.20060mdk.src.rpm Mandriva Linux 2006/X86_64 bb14640ab8713c5b3f44cd15a6cbfd72 2006.0/x86_64/lib64popt0-1.10.2-4.1.20060mdk.x86_64.rpm 5d4bd203f9844115a53fee6de190dabd 2006.0/x86_64/lib64popt0-devel-1.10.2-4.1.20060mdk.x86_64.rpm f242a162132559012189d600c38e21f3 2006.0/x86_64/lib64rpm4.4-4.4.2-4.1.20060mdk.x86_64.rpm 4a17a2fd93eb74a639c58138396e8b89 2006.0/x86_64/lib64rpm4.4-devel-4.4.2-4.1.20060mdk.x86_64.rpm aac88e00af81aafbda4b0170c87871af 2006.0/x86_64/popt-data-1.10.2-4.1.20060mdk.x86_64.rpm 3b03bfdd11a0d85fe2a8371b41047672 2006.0/x86_64/python-rpm-4.4.2-4.1.20060mdk.x86_64.rpm 2f13fe1a05869bbc014872ba94adc651 2006.0/x86_64/rpm-4.4.2-4.1.20060mdk.x86_64.rpm ab18d859a504eb187f75c1b4485a2faa 2006.0/x86_64/rpm-build-4.4.2-4.1.20060mdk.x86_64.rpm 5f7eb369ce3e98bf38200249f49ebc51 2006.0/SRPMS/rpm-4.4.2-4.1.20060mdk.src.rpm Mandriva Linux 2007 a75aec8f4db96e061788e150c3fbd3f3 2007.0/i586/libpopt0-1.10.6-10.1mdv2007.0.i586.rpm 54633d6a05bafe5a2c6d94849810ac75 2007.0/i586/libpopt0-devel-1.10.6-10.1mdv2007.0.i586.rpm 5aa3a3c773dd1524e28af4a45d6d6e5c 2007.0/i586/librpm4.4-4.4.6-10.1mdv2007.0.i586.rpm ac7d8b20b6e3054b062b6ffe3b652b9d 2007.0/i586/librpm4.4-devel-4.4.6-10.1mdv2007.0.i586.rpm 76a3d169fa999f3a2051152e875b0808 2007.0/i586/perl-RPM-0.66-16.1mdv2007.0.i586.rpm edce96423e51a56fe6803d9722a764d6 2007.0/i586/popt-data-1.10.6-10.1mdv2007.0.i586.rpm 7245317fdbb0e3d8773a75e5da71d796 2007.0/i586/python-rpm-4.4.6-10.1mdv2007.0.i586.rpm d52b92cd397740be24a610fb44bea279 2007.0/i586/rpm-4.4.6-10.1mdv2007.0.i586.rpm b149eab9008351135d615b4e69d88d78 2007.0/i586/rpm-build-4.4.6-10.1mdv2007.0.i586.rpm 0104fb281a097447faca48e642821df7 2007.0/SRPMS/rpm-4.4.6-10.1mdv2007.0.src.rpm Mandriva Linux 2007/X86_64 fff2a71466af9a6e23583a4ea854258c 2007.0/x86_64/lib64popt0-1.10.6-10.1mdv2007.0.x86_64.rpm 97602d4b17422835e55cafad1883cca5 2007.0/x86_64/lib64popt0-devel-1.10.6-10.1mdv2007.0.x86_64.rpm a5d31e5202cee164878500d00134eb3d 2007.0/x86_64/lib64rpm4.4-4.4.6-10.1mdv2007.0.x86_64.rpm 88c90b1670b128e784fda4290973351d 2007.0/x86_64/lib64rpm4.4-devel-4.4.6-10.1mdv2007.0.x86_64.rpm bd74199394643d4ef13829fcd4fb27ab 2007.0/x86_64/perl-RPM-0.66-16.1mdv2007.0.x86_64.rpm d73e492a7290a6c12f500aff926c22b2 2007.0/x86_64/popt-data-1.10.6-10.1mdv2007.0.x86_64.rpm 45dc5f66d45a6f4574f9e59d690e711c 2007.0/x86_64/python-rpm-4.4.6-10.1mdv2007.0.x86_64.rpm 08b83d32b1eddc88dc39ee095ea15a9b 2007.0/x86_64/rpm-4.4.6-10.1mdv2007.0.x86_64.rpm 18137bb3a65c0685a013f61f8b8aa173 2007.0/x86_64/rpm-build-4.4.6-10.1mdv2007.0.x86_64.rpm 0104fb281a097447faca48e642821df7 2007.0/SRPMS/rpm-4.4.6-10.1mdv2007.0.src.rpm ORIGINAL ADVISORY: http://www.mandriva.com/security/advisories?name=MDKSA-2006:200 OTHER REFERENCES: SA22740: http://secunia.com/advisories/22740 ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------