Secunia Security Advisory - Mandriva has issued an update for sash. This fixes some vulnerabilities, which can be exploited by malicious people to conduct a DoS (Denial of Service) against a vulnerable application or potentially execute arbitrary code.
d2d02b235771940f63b5c623fa7dc625391d3093f33b21f42ce2c7c118acb925
TITLE:
Mandriva update for sash
SECUNIA ADVISORY ID:
SA19597
VERIFY ADVISORY:
https://secunia.com/advisories/19597/
CRITICAL:
Moderately critical
IMPACT:
DoS, System access
WHERE:
>From remote
OPERATING SYSTEM:
Mandriva Linux 2006
https://secunia.com/product/9020/
DESCRIPTION:
Mandriva has issued an update for sash. This fixes some
vulnerabilities, which can be exploited by malicious people to
conduct a DoS (Denial of Service) against a vulnerable application or
potentially execute arbitrary code.
For more information:
SA15949
SA16137
SOLUTION:
Apply updated packages.
-- Mandrivalinux 2006 --
6a8ef8036ca25661d6e1e18e826b7cf7
2006.0/RPMS/sash-3.7-3.1.20060mdk.i586.rpm
ebfdd661247a673a536d14b57bd1494f
2006.0/SRPMS/sash-3.7-3.1.20060mdk.src.rpm
-- Mandrivalinux 2006/X86_64 --
f3ace9f835ba2bcf3358404ec3b35863
x86_64/2006.0/RPMS/sash-3.7-3.1.20060mdk.x86_64.rpm
ebfdd661247a673a536d14b57bd1494f
x86_64/2006.0/SRPMS/sash-3.7-3.1.20060mdk.src.rpm
ORIGINAL ADVISORY:
https://wwwnew.mandriva.com/security/advisories?name=MDKSA-2006:070
OTHER REFERENCES:
SA15949:
https://secunia.com/advisories/15949/
SA16137:
https://secunia.com/advisories/16137/
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
https://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
https://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------