2015 m. sausio 16 d., penktadienis

[ MDVSA-2015:025 ] mpfr

Mandriva Linux Security Advisory                         MDVSA-2015:025
 http://www.mandriva.com/en/support/security/
 ____________________________________________________________
___________

 Package : mpfr
 Date    : January 15, 2015
 Affected: Business Server 1.0
 _______________________________________________________________________

 Problem Description:

 Updated mpfr packages fix security vulnerability:

 A buffer overflow was reported in mpfr. This is due to incorrect
 GMP documentation for mpn_set_str about the size of a buffer
 (CVE-2014-9474).
 _______________________________________________________________________

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9474
 http://advisories.mageia.org/MGASA-2015-0021.html
 _______________________________________________________________________

 Updated Packages:

 Mandriva Business Server 1/X86_64:
 1bacc42d7f0c3363d559fee128d997cf  mbs1/x86_64/lib64mpfr4-3.1.0-2.1.mbs1.x86_64.rpm
 f6949f416ef64879650a4f108d8ccdc1  mbs1/x86_64/lib64mpfr-devel-3.1.0-2.1.mbs1.x86_64.rpm
 4ea1332af833a893bd66b35b43401279  mbs1/x86_64/lib64mpfr-static-devel-3.1.0-2.1.mbs1.x86_64.rpm
 3905ac70c726175777324eb379b49b2f  mbs1/SRPMS/mpfr-3.1.0-2.1.mbs1.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/en/support/security/advisories/

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com

Komentarų nėra:

Rašyti komentarą