- --------------------------------------------------------------------------
Debian-Edu/Skolelinux Security Advisory DESA 2004-023
http://www.skolelinux.no/security/                       Finn-Arne Johansen
December 12, 2004               [EMAIL PROTECTED]
- --------------------------------------------------------------------------

Package             : nfs-utils
Vulnerability       : wrong signal handler
Problem-Type        : remote
Need reboot         : no
Debian-Edu-specific : no
CVE ID              : CAN-2004-1014
DSA ID              : DSA-606-1

SGI has discovered that rpc.statd from the nfs-utils package, the Network
Status Monitor, did not ignore the "SIGPIPE". Hence, a client prematurely
terminating the TCP connection could also terminate the server process.

We recommend that you upgrade your nfs-utils packages.

Upgrade Instructions
- --------------------

Make sure the line

  deb http://security.debian.org/ stable/updates main contrib non-free

is present in your /etc/apt/sources.list and run 'apt-get update' to
update your package lists. 
Then run 'apt-get install nfs-utils nfs-kernel-server' to upgrade your
nfs-utils packages.

- --------------------------------------------------------------------------
Mailing list: [EMAIL PROTECTED], [email protected],
              [EMAIL PROTECTED], [EMAIL PROTECTED],
              [EMAIL PROTECTED]
Package info: `apt-cache show <pkg>'

Attachment: signature.asc
Description: Digital signature

Reply via email to