English | Deutsch | Español | Português
 UserID:
 Passwd:
new user
 About:   Dedicated  | Advanced  | Standard  | Recurring  | No Risk  | Desktop  | Basic  | Single  | Security Seal  | FAQ
  Price/Feature Summary  | Order  | New Vulnerabilities  | Confidentiality  | Vulnerability Search
 Vulnerability   
Search   
    Search 102521 CVE descriptions
and 54701 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2011-11528
2011-08-26 18:28:28
--------------------------------------------------------------------------------

Name        : maniadrive
Product     : Fedora 15
Version     : 1.2
Release     : 32.fc15
URL         : http://maniadrive.raydium.org/
Summary     : 3D stunt driving game
Description :
ManiaDrive is an arcade car game on acrobatic tracks, with a quick and nervous
gameplay (tracks almost never exceed one minute). Features: Complex car
physics, Challenging "story mode", LAN and Internet mode, Live scores,
Track editor, Dedicated server with HTTP interface and More than 30 blocks.

--------------------------------------------------------------------------------
Update Information:

Security Enhancements and Fixes:

* Updated crypt_blowfish to 1.2. (CVE-2011-2483)
* Fixed crash in error_log(). Reported by Mateusz Kocielski
* Fixed buffer overflow on overlog salt in crypt().
* Fixed bug #54939 (File path injection vulnerability in RFC1867 File upload filename). Reported by Krzysztof Kotowicz. (CVE-2011-2202)
* Fixed stack buffer overflow in socket_connect(). (CVE-2011-1938)
* Fixed bug #54238 (use-after-free in substr_replace()). (CVE-2011-1148)

Upstream announce for 5.3.8: http://www.php.net/archive/2011.php#id2011-08-23-1
Upstream announce for 5.3.7: http://www.php.net/archive/2011.php#id2011-08-18-1

Full Changelog: http://www.php.net/ChangeLog-5.php#5.3.8

--------------------------------------------------------------------------------
ChangeLog:

* Tue Aug 23 2011 Remi Collet <remi@fedoraproject.org> - 1.2-32
- rebuild against PHP 5.3.8
* Fri Aug 19 2011 Remi Collet <remi@fedoraproject.org> - 1.2-31
- rebuild against PHP 5.3.7
--------------------------------------------------------------------------------
References:

  [ 1 ] Bug #715025 - CVE-2011-2483 crypt_blowfish: 8-bit character mishandling allows different password pairs to produce the same hash
        https://bugzilla.redhat.com/show_bug.cgi?id=715025
  [ 2 ] Bug #713194 - CVE-2011-2202 php: file path injection vulnerability in RFC1867 file upload filename
        https://bugzilla.redhat.com/show_bug.cgi?id=713194
  [ 3 ] Bug #709067 - CVE-2011-1938 php: stack-based buffer overflow in socket_connect()
        https://bugzilla.redhat.com/show_bug.cgi?id=709067
  [ 4 ] Bug #688958 - CVE-2011-1148 php: use-after-free vulnerability in substr_replace()
        https://bugzilla.redhat.com/show_bug.cgi?id=688958
  [ 5 ] Bug #732516 - CVE-2011-3182 PHP multiple NULL pointer dereferences
        https://bugzilla.redhat.com/show_bug.cgi?id=732516
--------------------------------------------------------------------------------

This update can be installed with the "yum" update program.  Use 
su -c 'yum update maniadrive' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.

All packages are signed with the Fedora Project GPG key.  More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________
package-announce mailing list
package-announce@lists.fedoraproject.org
https://admin.fedoraproject.org/mailman/listinfo/package-announce

New User Registration
Email:
UserID:
Passwd:
Please email me your monthly newsletters, informing the latest services, improvements & surveys.
Please email me a vulnerability test announcement whenever a new test is added.
   Privacy
Registered User Login
 
UserID:   
Passwd:  

 Forgot userid or passwd?
Email/Userid:




Home | About Us | Contact Us | Partner Programs | Developer APIs | Privacy | Mailing Lists | Abuse
Security Audits | Managed DNS | Network Monitoring | Site Analyzer | Internet Research Reports
Web Probe | Whois

© 1998-2017 E-Soft Inc. All rights reserved.