http://www.mandriva.com/en/
______________________________
Package : gd
Date : July 10, 2014
Affected: Business Server 1.0
______________________________
Problem Description:
Updated gd and libgd packages fix security vulnerability:
The gdImageCreateFromXpm function in gdxpm.c in the gd image library
allows remote attackers to cause a denial of service (NULL pointer
dereference and application crash) via a crafted color table in an
XPM file (CVE-2014-2497).
______________________________
References:
http://cve.mitre.org/cgi-bin/
http://advisories.mageia.org/
______________________________
Updated Packages:
Mandriva Business Server 1/X86_64:
133d72d12a278f494662878dd8b8fa
91c8a7f9053c2c335ea49bbb30bb21
3422b3f8b50dc626be29096304662d
09b1c9c6e62fc636173aafac4a36f7
7afba6bce1ba80c873bbe2df3bf898
______________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/en/
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
Komentarų nėra:
Rašyti komentarą