______________________________________________________________________ Mandrake Linux Security Update Advisory ______________________________________________________________________ Package name: ypserv Advisory ID: MDKSA-2002:078 Date: November 18th, 2002 Affected versions: 7.2, 8.0, 8.1, 8.2, 9.0 ______________________________________________________________________ Problem Description: A memory leak that could be triggered remotely was discovered in ypserv 2.5 and earlier. This could lead to a Denial of Service as repeated requests for a non-existant map will result in ypserv consuming more and more memory, and also running more slowly. If the system runs out of available memory, ypserv would also be killed. ______________________________________________________________________ References: ______________________________________________________________________ Updated Packages: Linux-Mandrake 7.2: 45911e795e82a5615f5c62ccdf6d442c 7.2/RPMS/ypserv-1.3.12-3.2mdk.i586.rpm 5e57fc67855963ec4eef3d87a4f4ba6f 7.2/SRPMS/ypserv-1.3.12-3.2mdk.src.rpm Mandrake Linux 8.0: 2bc8207693dc4e7b8095e9ce9ab761fa 8.0/RPMS/ypserv-1.3.12-3.2mdk.i586.rpm 5e57fc67855963ec4eef3d87a4f4ba6f 8.0/SRPMS/ypserv-1.3.12-3.2mdk.src.rpm Mandrake Linux 8.0/PPC: b478eda36eda7eaddb120aa065a81e3e ppc/8.0/RPMS/ypserv-1.3.12-3.2mdk.ppc.rpm 5e57fc67855963ec4eef3d87a4f4ba6f ppc/8.0/SRPMS/ypserv-1.3.12-3.2mdk.src.rpm Mandrake Linux 8.1: 5ad392879587b4dee5c7b5dabeefa9c9 8.1/RPMS/ypserv-1.3.12-3.2mdk.i586.rpm 5e57fc67855963ec4eef3d87a4f4ba6f 8.1/SRPMS/ypserv-1.3.12-3.2mdk.src.rpm Mandrake Linux 8.1/IA64: bb0c485e824d4c6f9e6ac9ac9cb3a373 ia64/8.1/RPMS/ypserv-1.3.12-3.2mdk.ia64.rpm 5e57fc67855963ec4eef3d87a4f4ba6f ia64/8.1/SRPMS/ypserv-1.3.12-3.2mdk.src.rpm Mandrake Linux 8.2: b4b6984c3834eabd33578dfed24a53a8 8.2/RPMS/ypserv-2.5-1.1mdk.i586.rpm 0ae1ae479fca968b041de021a6bdde56 8.2/SRPMS/ypserv-2.5-1.1mdk.src.rpm Mandrake Linux 8.2/PPC: 79ee559c9fcc7fd6efe25746723ea375 ppc/8.2/RPMS/ypserv-2.5-1.1mdk.ppc.rpm 0ae1ae479fca968b041de021a6bdde56 ppc/8.2/SRPMS/ypserv-2.5-1.1mdk.src.rpm Mandrake Linux 9.0: d422a834b1869149b38bf1c8a1e8a4d6 9.0/RPMS/ypserv-2.5-1.1mdk.i586.rpm 0ae1ae479fca968b041de021a6bdde56 9.0/SRPMS/ypserv-2.5-1.1mdk.src.rpm ______________________________________________________________________ Bug IDs fixed (see https://qa.mandrakesoft.com for more information): ______________________________________________________________________ To upgrade automatically, use MandrakeUpdate. The verification of md5 checksums and GPG signatures is performed automatically for you. If you want to upgrade manually, download the updated package from one of our FTP server mirrors and upgrade with "rpm -Fvh *.rpm". A list of FTP mirrors can be obtained from: http://www.mandrakesecure.net/en/ftp.php Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command: rpm --checksig <filename> All packages are signed by MandrakeSoft for security. You can obtain the GPG public key of the Mandrake Linux Security Team from: https://www.mandrakesecure.net/RPM-GPG-KEYS Please be aware that sometimes it takes the mirrors a few hours to update. You can view other update advisories for Mandrake Linux at: http://www.mandrakesecure.net/en/advisories/ MandrakeSoft has several security-related mailing list services that anyone can subscribe to. Information on these lists can be obtained by visiting: http://www.mandrakesecure.net/en/mlist.php If you want to report vulnerabilities, please contact security_linux-mandrake.com Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Linux Mandrake Security Team <security linux-mandrake.com>
Mandrake Linux Advisory: ypserv
By
Get the Free Newsletter!
Subscribe to Developer Insider for top news, trends, & analysis