Bug 9180 - transmission new security issue CVE-2012-6129
: transmission new security issue CVE-2012-6129
Status: RESOLVED FIXED
Product: Mageia
Classification: Unclassified
Component: Security
: 2
: i586 Linux
: Normal Severity: major
: ---
Assigned To: QA Team
: Sec team
: http://lwn.net/Vulnerabilities/539878/
: MGA2-64-OK MGA2-32-OK
: validated_update
:
:
  Show dependency treegraph
 
Reported: 2013-02-25 20:00 CET by David Walser
Modified: 2013-02-27 22:13 CET (History)
3 users (show)

See Also:
Source RPM: transmission-2.51-1.2.mga2.src.rpm
CVE:
Status comment:


Attachments

Description David Walser 2013-02-25 20:00:45 CET
Ubuntu has issued an advisory today (February 25):
http://www.ubuntu.com/usn/usn-1747-1/

Cauldron is not affected as it's fixed in the latest version, which we have.

Patched package uploaded for Mageia 2.

Advisory:
========================

Updated transmission packages fix security vulnerability:

It was discovered that Transmission incorrectly handled certain micro
transport protocol packets. A remote attacker could use this issue to cause
a denial of service, or possibly execute arbitrary code (CVE-2012-6129).

References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6129
http://www.ubuntu.com/usn/usn-1747-1/
========================

Updated packages in core/updates_testing:
========================
transmission-common-2.51-1.3.mga2
transmission-cli-2.51-1.3.mga2
transmission-gtk-2.51-1.3.mga2
transmission-qt4-2.51-1.3.mga2
transmission-daemon-2.51-1.3.mga2

from transmission-2.51-1.3.mga2.src.rpm

Reproducible: 

Steps to Reproduce:
Comment 1 Dave Hodgins 2013-02-27 02:49:21 CET
No poc, so just testing that tranmission-daemon, qt, etc work.

Testing complete on Mageia 2 i586 and x86_64.

Could someone from the sysadmin team push the srpm
transmission-2.51-1.3.mga2.src.rpm
from Mageia 2 Core Updates Testing to Core Updates.

Advisory: Updated transmission packages fix security vulnerability:

It was discovered that Transmission incorrectly handled certain micro
transport protocol packets. A remote attacker could use this issue to cause
a denial of service, or possibly execute arbitrary code (CVE-2012-6129).

References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6129
http://www.ubuntu.com/usn/usn-1747-1/
https://bugs.mageia.org/show_bug.cgi?id=9180
Comment 2 Thomas Backlund 2013-02-27 22:13:59 CET
Update pushed:
https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0074

Note You need to log in before you can comment on or make changes to this bug.