2015 m. vasario 11 d., trečiadienis

[ MDVSA-2015:039 ] glibc

Mandriva Linux Security Advisory                         MDVSA-2015:039
 http://www.mandriva.com/en/support/security/
 ____________________________________________________________
___________

 Package : glibc
 Date    : February 10, 2015
 Affected: Business Server 1.0
 _______________________________________________________________________

 Problem Description:

 A vulnerability has been discovered and corrected in glibc:

 Heap-based buffer overflow in the __nss_hostname_digits_dots
 function in glibc 2.2, and other 2.x versions before 2.18, allows
 context-dependent attackers to execute arbitrary code via vectors
 related to the (1) gethostbyname or (2) gethostbyname2 function,
 aka GHOST. (CVE-2015-0235)

 The updated packages have been patched to correct this issue.
 _______________________________________________________________________

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-0235
 https://rhn.redhat.com/errata/RHSA-2015-0092.html
 _______________________________________________________________________

 Updated Packages:

 Mandriva Business Server 1/X86_64:
 678efef85b85206451ef8927bad808e0  mbs1/x86_64/glibc-2.14.1-12.11.mbs1.x86_64.rpm
 46cd508f03e36c1e4f752c317852ec8e  mbs1/x86_64/glibc-devel-2.14.1-12.11.mbs1.x86_64.rpm
 069302c80e3b79504e2b0eaaa72c2745  mbs1/x86_64/glibc-doc-2.14.1-12.11.mbs1.noarch.rpm
 3a841c0295823354655dd3e7734ada0b  mbs1/x86_64/glibc-doc-pdf-2.14.1-12.11.mbs1.noarch.rpm
 11a672a0b4bae77c7adfa803bea9871f  mbs1/x86_64/glibc-i18ndata-2.14.1-12.11.mbs1.x86_64.rpm
 d3f113ccec4f18e4bb08c951625e51d7  mbs1/x86_64/glibc-profile-2.14.1-12.11.mbs1.x86_64.rpm
 f6d6aa5806dd747e66996ea8cc01c9b4  mbs1/x86_64/glibc-static-devel-2.14.1-12.11.mbs1.x86_64.rpm
 98cc6eae0234eeed945712bbc8b2c0ea  mbs1/x86_64/glibc-utils-2.14.1-12.11.mbs1.x86_64.rpm
 bf6f2fcc3dd21bd8380aac40e91bb802  mbs1/x86_64/nscd-2.14.1-12.11.mbs1.x86_64.rpm
 f597e4d6241c76701733d730e84f5714  mbs1/SRPMS/glibc-2.14.1-12.11.mbs1.src.rpm
 _______________________________________________________________________

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/en/support/security/advisories/

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com

Komentarų nėra:

Rašyti komentarą