Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2010-0858

Опубликовано: 10 фев. 2011
Источник: oracle-oval
Платформа: Oracle Linux 6

Описание

ELSA-2010-0858: bzip2 security update (IMPORTANT)

[1.0.5-7]

  • Resolves: #632268 integer overflow flaw in BZ2_decompress - CVE-2010-0405 (upstream patch)

Обновленные пакеты

Oracle Linux 6

Oracle Linux x86_64

bzip2

1.0.5-7.el6_0

bzip2-devel

1.0.5-7.el6_0

bzip2-libs

1.0.5-7.el6_0

Oracle Linux i686

bzip2

1.0.5-7.el6_0

bzip2-devel

1.0.5-7.el6_0

bzip2-libs

1.0.5-7.el6_0

Oracle Linux sparc64

bzip2

1.0.5-7.el6_0

bzip2-devel

1.0.5-7.el6_0

bzip2-libs

1.0.5-7.el6_0

Связанные CVE

Связанные уязвимости

ubuntu
почти 15 лет назад

Integer overflow in the BZ2_decompress function in decompress.c in bzip2 and libbzip2 before 1.0.6 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted compressed file.

redhat
почти 15 лет назад

Integer overflow in the BZ2_decompress function in decompress.c in bzip2 and libbzip2 before 1.0.6 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted compressed file.

nvd
почти 15 лет назад

Integer overflow in the BZ2_decompress function in decompress.c in bzip2 and libbzip2 before 1.0.6 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted compressed file.

debian
почти 15 лет назад

Integer overflow in the BZ2_decompress function in decompress.c in bzi ...

github
больше 3 лет назад

Integer overflow in the BZ2_decompress function in decompress.c in bzip2 and libbzip2 before 1.0.6 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted compressed file.