U radu programskog paketa nut (Network UPS Tools), za operacijske sustave Fedora 15, 16 i 17, uočen je sigurnosni propust. Udaljenim napadačima omogućuje DoS napad ili izvršavanje proizvoljnog programskog koda.
Paket: | nut 2.x |
Operacijski sustavi: | Fedora 15, Fedora 16, Fedora 17 |
Kritičnost: | 6.5 |
Problem: | neodgovarajuća provjera ulaznih podataka, pogreška u programskoj funkciji |
Iskorištavanje: | udaljeno |
Posljedica: | proizvoljno izvršavanje programskog koda, uskraćivanje usluga (DoS) |
Rješenje: | programska zakrpa proizvođača |
CVE: | CVE-2012-2944 |
Izvorni ID preporuke: | FEDORA-2012-8747 |
Izvor: | Fedora |
Problem: | |
Propust je posljedica neodgovarajuće provjere ulaznih podataka u funkciji "addchar()" i može izazvati prepisivanje spremnika. |
|
Posljedica: | |
Napadači ga mogu iskoristiti za izvođenje DoS napada ili pokretanje proizvoljnog programskog koda. |
|
Rješenje: | |
Korisnicima se preporuča instalacija nadogradnje. |
Izvorni tekst preporuke
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2012-8747
2012-06-01 16:20:14
--------------------------------------------------------------------------------
Name : nut
Product : Fedora 15
Version : 2.6.3
Release : 4.fc15
URL : http://www.networkupstools.org/
Summary : Network UPS Tools
Description :
These programs are part of a developing project to monitor the assortment
of UPSes that are found out there in the field. Many models have serial
ports of some kind that allow some form of state checking. This
capability has been harnessed where possible to allow for safe shutdowns,
live status tracking on web pages, and more.
--------------------------------------------------------------------------------
Update Information:
fix heap-based buffer overflow due improper processing of non-printable
characters in random network data (CVE-2012-2944)
- no change, just updated release number to fix upgrade path
--------------------------------------------------------------------------------
ChangeLog:
* Thu May 31 2012 Michal Hlavinka <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 2.6.3-4
- fix heap-based buffer overflow due improper processing of non-printable
characters in random network data (CVE-2012-2944)
* Mon May 14 2012 Michal Hlavinka <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 2.6.3-3
- fix paths, UsrMove happened only in F17+
* Mon Apr 16 2012 Michal Hlavinka <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 2.6.3-2
- do not forget to create /var/run/nut before starting service (#812825)
* Fri Jan 13 2012 Michal Hlavinka <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 2.6.3-1
- nut updated to 2.6.3
* Fri Sep 16 2011 Michal Hlavinka <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 2.6.2-1
- nut updated to 2.6.2
* Mon Aug 22 2011 Michal Hlavinka <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 2.6.1-4
- service startup not reported correctly in netclient mode (#732151)
* Tue Aug 16 2011 Michal Hlavinka <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 2.6.1-3
- update requirements of packages
* Fri Aug 12 2011 Michal Hlavinka <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 2.6.1-2
- standard dependency adds udev, but we need it for %pre script
* Tue Jun 7 2011 Michal Hlavinka <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 2.6.1-1
- nut updated to 2.6.1
* Mon May 30 2011 Michal Hlavinka <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 2.6.0-8
- remove hal requirement from -cgi and -client
* Fri May 20 2011 Michal Hlavinka <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 2.6.0-7
- add shutdown script for systemd
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #826489 - CVE-2012-2944 nut: Heap-based buffer overflow due improper
processing of non-printable characters in random network data
https://bugzilla.redhat.com/show_bug.cgi?id=826489
--------------------------------------------------------------------------------
This update can be installed with the "yum" update program. Use
su -c 'yum update nut' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________
package-announce mailing list
Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.
https://admin.fedoraproject.org/mailman/listinfo/package-announce
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2012-8729
2012-06-01 16:19:26
--------------------------------------------------------------------------------
Name : nut
Product : Fedora 16
Version : 2.6.3
Release : 4.fc16
URL : http://www.networkupstools.org/
Summary : Network UPS Tools
Description :
These programs are part of a developing project to monitor the assortment
of UPSes that are found out there in the field. Many models have serial
ports of some kind that allow some form of state checking. This
capability has been harnessed where possible to allow for safe shutdowns,
live status tracking on web pages, and more.
--------------------------------------------------------------------------------
Update Information:
fix heap-based buffer overflow due improper processing of non-printable
characters in random network data (CVE-2012-2944)
- no change, just updated release number to fix upgrade path
--------------------------------------------------------------------------------
ChangeLog:
* Thu May 31 2012 Michal Hlavinka <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 2.6.3-4
- fix heap-based buffer overflow due improper processing of non-printable
characters in random network data (CVE-2012-2944)
* Mon May 14 2012 Michal Hlavinka <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 2.6.3-3
- fix paths, UsrMove happened only in F17+
* Mon Apr 16 2012 Michal Hlavinka <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 2.6.3-2
- do not forget to create /var/run/nut before starting service (#812825)
* Wed Jan 11 2012 Michal Hlavinka <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 2.6.3-1
- nut updated to 2.6.3
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #826489 - CVE-2012-2944 nut: Heap-based buffer overflow due improper
processing of non-printable characters in random network data
https://bugzilla.redhat.com/show_bug.cgi?id=826489
--------------------------------------------------------------------------------
This update can be installed with the "yum" update program. Use
su -c 'yum update nut' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________
package-announce mailing list
Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.
https://admin.fedoraproject.org/mailman/listinfo/package-announce
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2012-8694
2012-06-01 16:17:44
--------------------------------------------------------------------------------
Name : nut
Product : Fedora 17
Version : 2.6.3
Release : 4.fc17
URL : http://www.networkupstools.org/
Summary : Network UPS Tools
Description :
These programs are part of a developing project to monitor the assortment
of UPSes that are found out there in the field. Many models have serial
ports of some kind that allow some form of state checking. This
capability has been harnessed where possible to allow for safe shutdowns,
live status tracking on web pages, and more.
--------------------------------------------------------------------------------
Update Information:
fix heap-based buffer overflow due improper processing of non-printable
characters in random network data (CVE-2012-2944)
- no change, just updated release number to fix upgrade path
--------------------------------------------------------------------------------
ChangeLog:
* Thu May 31 2012 Michal Hlavinka <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 2.6.3-3
- fix heap-based buffer overflow due improper processing of non-printable
characters in random network data (CVE-2012-2944)
* Mon May 28 2012 Michal Hlavinka <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 2.6.3-3
- bump release nubmer to fix upgrade path
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #826489 - CVE-2012-2944 nut: Heap-based buffer overflow due improper
processing of non-printable characters in random network data
https://bugzilla.redhat.com/show_bug.cgi?id=826489
--------------------------------------------------------------------------------
This update can be installed with the "yum" update program. Use
su -c 'yum update nut' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________
package-announce mailing list
Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.
https://admin.fedoraproject.org/mailman/listinfo/package-announce
Posljednje sigurnosne preporuke