LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Security Week: October 20th, 2014
Linux Advisory Watch: October 17th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Mandriva: [ MDVA-2009:023 ] db46 Print E-mail
User Rating:      How can I rate this item?
Posted by Benjamin D. Thomas   
Mandrake Additional official patches have been released for db 4.6 after Mandriva release.
 _______________________________________________________________________

 Mandriva Linux Advisory                                   MDVA-2009:023
 http://www.mandriva.com/security/
 _______________________________________________________________________

 Package : db46
 Date    : February 12, 2009
 Affected: 2008.1, 2009.0
 _______________________________________________________________________

 Problem Description:

 Additional official patches have been released for db 4.6 after
 Mandriva release. They fix the following issues:
 
 - There was the possibility that the wrong number of mutexes would
 be allocated. This issue could cause applications with multiple cache
 regions to see undefined behavior in rare cases under load
 - Replication clients should be able to open a sequence
 _______________________________________________________________________

 Updated Packages:

 Mandriva Linux 2008.1:
 4ef87c0f59d7bcfeafff84246debec74  2008.1/i586/db4.6-4.6.21-7.1mdv2008.1.i586.rpm
 4fe46a2a7efb119938e4717fd49defdd  2008.1/i586/db4.6-javadoc-4.6.21-7.1mdv2008.1.i586.rpm
 97b9e20ac59bbc4ae051440bd2d17772  2008.1/i586/db46-utils-4.6.21-7.1mdv2008.1.i586.rpm
 ba1676695ed526d43b6081d334e4cc42  2008.1/i586/libdb4.6-4.6.21-7.1mdv2008.1.i586.rpm
 f641d28419273aba02921f2b6bec69c9  2008.1/i586/libdb4.6-devel-4.6.21-7.1mdv2008.1.i586.rpm
 e0494ce80c78c41e1fd2b338159358cf  2008.1/i586/libdb4.6-static-devel-4.6.21-7.1mdv2008.1.i586.rpm
 6134b4c5f658b03d1a863403397052f6  2008.1/i586/libdbcxx4.6-4.6.21-7.1mdv2008.1.i586.rpm
 33c71fbe5a940f0a5f7fade19ba089dd  2008.1/i586/libdbnss4.6-4.6.21-7.1mdv2008.1.i586.rpm
 1f53357f50bd578073057a545e477ab2  2008.1/i586/libdbnss4.6-devel-4.6.21-7.1mdv2008.1.i586.rpm
 0847867b680fcdf22eb3d84fd828dbd3  2008.1/i586/libdbtcl4.6-4.6.21-7.1mdv2008.1.i586.rpm 
 40abfe650c4b66b0312c384bd43a1a01  2008.1/SRPMS/db46-4.6.21-7.1mdv2008.1.src.rpm

 Mandriva Linux 2008.1/X86_64:
 4fa3f09038f7d9a0e190c465275fb0ad  2008.1/x86_64/db4.6-4.6.21-7.1mdv2008.1.x86_64.rpm
 31784f48183448f704aee530176504b9  2008.1/x86_64/db4.6-javadoc-4.6.21-7.1mdv2008.1.x86_64.rpm
 305b04f5795e61d1662409ebbded54b7  2008.1/x86_64/db46-utils-4.6.21-7.1mdv2008.1.x86_64.rpm
 87f18144e5196b65c7651d32f6737e13  2008.1/x86_64/lib64db4.6-4.6.21-7.1mdv2008.1.x86_64.rpm
 d96a42d17abd3165df17ee10fd1aa3b2  2008.1/x86_64/lib64db4.6-devel-4.6.21-7.1mdv2008.1.x86_64.rpm
 ef01c82a9d0ff92f2a7909380eea9f9d  2008.1/x86_64/lib64db4.6-static-devel-4.6.21-7.1mdv2008.1.x86_64.rpm
 9a2aac0df02f9e06b698069d4b3cbd28  2008.1/x86_64/lib64dbcxx4.6-4.6.21-7.1mdv2008.1.x86_64.rpm
 310e13eb835295a40ef36bce6e0db8ac  2008.1/x86_64/lib64dbnss4.6-4.6.21-7.1mdv2008.1.x86_64.rpm
 fa8597c38e40f4725dc8d3d4e011d879  2008.1/x86_64/lib64dbnss4.6-devel-4.6.21-7.1mdv2008.1.x86_64.rpm
 123deabcb7b16b7116069d4ff9aa3a0d  2008.1/x86_64/lib64dbtcl4.6-4.6.21-7.1mdv2008.1.x86_64.rpm 
 40abfe650c4b66b0312c384bd43a1a01  2008.1/SRPMS/db46-4.6.21-7.1mdv2008.1.src.rpm

 Mandriva Linux 2009.0:
 427777c49dda3c4991a14fc5e4a16e69  2009.0/i586/db4.6-4.6.21-10.1mdv2009.0.i586.rpm
 9e24e8a60637eb1cb583c2efbb9b65a0  2009.0/i586/db4.6-javadoc-4.6.21-10.1mdv2009.0.i586.rpm
 1efc506427114c2db733c7036f6ada54  2009.0/i586/db46-utils-4.6.21-10.1mdv2009.0.i586.rpm
 830ed4ac3d7cec2ce4d1b0d0bc5c0d92  2009.0/i586/libdb4.6-4.6.21-10.1mdv2009.0.i586.rpm
 0aa0af682876edd20777133e119f54ef  2009.0/i586/libdb4.6-devel-4.6.21-10.1mdv2009.0.i586.rpm
 c3040bc25e7657f09eef86e163ccc613  2009.0/i586/libdb4.6-static-devel-4.6.21-10.1mdv2009.0.i586.rpm
 531d0a92a6a1b505a057395500f202d3  2009.0/i586/libdbcxx4.6-4.6.21-10.1mdv2009.0.i586.rpm
 8c8e4c80c1c1b8761825d2ffa2f9574f  2009.0/i586/libdbnss4.6-4.6.21-10.1mdv2009.0.i586.rpm
 5f55b4ab30f9168f35db020bdbe8de48  2009.0/i586/libdbnss4.6-devel-4.6.21-10.1mdv2009.0.i586.rpm
 7381117066184f92c4d403dff29378a0  2009.0/i586/libdbtcl4.6-4.6.21-10.1mdv2009.0.i586.rpm 
 71fbc5c4e077b0dbce99facf1fcdcdd0  2009.0/SRPMS/db46-4.6.21-10.1mdv2009.0.src.rpm

 Mandriva Linux 2009.0/X86_64:
 91a41c540a359d951d8b703e78b14071  2009.0/x86_64/db4.6-4.6.21-10.1mdv2009.0.x86_64.rpm
 194b119571446019041767be09180c7f  2009.0/x86_64/db4.6-javadoc-4.6.21-10.1mdv2009.0.x86_64.rpm
 38807fc6276b794b2d961799ae21312b  2009.0/x86_64/db46-utils-4.6.21-10.1mdv2009.0.x86_64.rpm
 23fb810faa192285427e651e6f006cb2  2009.0/x86_64/lib64db4.6-4.6.21-10.1mdv2009.0.x86_64.rpm
 5a6620906c318ab0ef0edb6153ca7a11  2009.0/x86_64/lib64db4.6-devel-4.6.21-10.1mdv2009.0.x86_64.rpm
 0df55ce3bb71697eee785e6c5351b8f4  2009.0/x86_64/lib64db4.6-static-devel-4.6.21-10.1mdv2009.0.x86_64.rpm
 ca4260a1c3c3103fe11183eeaaf78884  2009.0/x86_64/lib64dbcxx4.6-4.6.21-10.1mdv2009.0.x86_64.rpm
 b5424ae7032fa24185da0e1e8ce08ebb  2009.0/x86_64/lib64dbnss4.6-4.6.21-10.1mdv2009.0.x86_64.rpm
 6a70403e4bb4b2c9b13259d2d1b363de  2009.0/x86_64/lib64dbnss4.6-devel-4.6.21-10.1mdv2009.0.x86_64.rpm
 a4e3b3ba36e50ef865c66458a5a2688d  2009.0/x86_64/lib64dbtcl4.6-4.6.21-10.1mdv2009.0.x86_64.rpm 
 71fbc5c4e077b0dbce99facf1fcdcdd0  2009.0/SRPMS/db46-4.6.21-10.1mdv2009.0.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/security/advisories

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 _______________________________________________________________________

 Type Bits/KeyID     Date       User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  
 
< Prev   Next >
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
USB is now UEC (use with extreme caution)
iPhone Encryption and the Return of the Crypto Wars
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.