2014 m. gegužės 19 d., pirmadienis

[ MDVSA-2014:098 ] rawtherapee

_______________________________________________________________________

 Mandriva Linux Security Advisory                         MDVSA-2014:098
 http://www.mandriva.com/en/support/security/
 _______________________________________________________________________

 Package : rawtherapee
 Date    : May 16, 2014
 Affected: Business Server 1.0
 _______________________________________________________________________

 Problem Description:

 Updated rawtherapee package fixes security vulnerability:

 Due to flaws in the embedded copy of dcraw in rawtherapee, corrupt
 input files might trigger a division by zero, an infinite loop,
 or a null pointer dereference (CVE-2013-1438).
 __________________________________________________
_____________________

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1438
 http://advisories.mageia.org/MGASA-2014-0081.html
 _______________________________________________________________________

 Updated Packages:

 Mandriva Business Server 1/X86_64:
 a1375a28f0b50d8f790b52d5981d1cd9  mbs1/x86_64/rawtherapee-4.0.7-2.1.mbs1.x86_64.rpm
 b5f62e979edf48bc8634879afb0eaf63  mbs1/SRPMS/rawtherapee-4.0.7-2.1.mbs1.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/en/support/security/advisories/

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com

Komentarų nėra:

Rašyti komentarą