Mandriva Linux Security Advisory MDVSA-2014:125
http://www.mandriva.com/en/
______________________________
Package : nspr
Date : June 13, 2014
Affected: Business Server 1.0, Enterprise Server 5.0
______________________________
Problem Description:
A vulnerability has been discovered and corrected in nspr:
Mozilla Netscape Portable Runtime (NSPR) before 4.10.6 allows remote
attackers to execute arbitrary code or cause a denial of service
(out-of-bounds write) via vectors involving the sprintf and console
functions (CVE-2014-1545).
The updated nspr packages have been upgraded to the 4.10.6 version
which is unaffected by this issue.
Additionally:
* The rootcerts package have been upgraded to the latest version as
of 2014-04-01.
* The nss packages have been upgraded to the latest 3.16.1 version
which resolves various bugs.
* The sqlite3 packages have been upgraded to the 3.7.17 version for
mbs1 due to an prerequisite to nss-3.16.1.
______________________________
References:
http://cve.mitre.org/cgi-bin/
http://www.mozilla.org/
https://developer.mozilla.org/
______________________________
Updated Packages:
Mandriva Enterprise Server 5:
871b7828588ddba14fe5a3fa633538
a2c0b64bc6cd6e64aacf08e403c904
7e5de8bd72b992637677b8f0e785cd
59a76907525859e8c5abb08af67db5
ca78336fa128083dafc47d99a5327d
aa17566d41af3c754cd33c51408542
8fc865c9d74bb3acb6c39e780c5553
2622f5d0951a9e82726f18ac0c8707
a452214d3dbdd48f67e51a0f60d9a0
2e37cefc0d57e66c496117eef3f8b6
d81f1303fee6dda1d9931194434a72
1693219abe0845f4b277b5ce0af658
Mandriva Enterprise Server 5/X86_64:
fefb6ed175ff09964d4289dd2e35e4
a742bdf485719a4241232ead1aa58d
e6c55cec0b0c593eed088947cedeaf
e4d27cd845a04e8f20ade562131166
6aa535f37bb44453f2ffb9e2c63008
85881c197e866031457d0c5e838c71
daf3b5119cb885652bed0daf79a3b8
22bcfc38fe4353ab329be15779ccbc
7f53efea4b3bb272b1bd282aecbbe1
2e37cefc0d57e66c496117eef3f8b6
d81f1303fee6dda1d9931194434a72
1693219abe0845f4b277b5ce0af658
Mandriva Business Server 1/X86_64:
971ca03b751a5b3e6d3afefdc8ebf0
a217173e1ad73f0e3fa53e3fa6f648
e2ec066d21ebcbf33610694b484a8d
b72f56cea5af20b689605f8608bd4e
d88bf2c9244bae5bf3eae084d59b26
b0962cfd80a4b2ca46dab9daa6f6a7
0b334598f4f234861b4fbfb6f42467
55b279bec9fc53e46212df18367cde
b21fb9c68187079fb0a14f2d7a5874
725ad41fdbc1c547f2c1283c1c855f
45838333e5000ae1064c93697b67d1
ef3993eb75903e2da63133926a05bb
8ac879f760d140f51fa7a7b924530d
fac1dec8bb96d10acc8562afa58369
f78b319fc6f6e236c41bb6236f227a
65bf32ce4c4bcf079599cd8a87048e
5d15ba18cb5a6ce74922f332aff834
d38697d45661b225754d9cabbb314e
d0f6f79de5b2fc80fdb420c8131dd7
______________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/en/
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
Komentarų nėra:
Rašyti komentarą