http://www.mandriva.com/en/
______________________________
Package : nss
Date : July 29, 2014
Affected: Business Server 1.0
______________________________
Problem Description:
A vulnerability has been found and corrected in mozilla NSS:
Use-after-free vulnerability in the CERT_DestroyCertificate function
in libnss3.so in Mozilla Network Security Services (NSS) 3.x, as used
in Firefox before 31.0, Firefox ESR 24.x before 24.7, and Thunderbird
before 24.7, allows remote attackers to execute arbitrary code via
vectors that trigger certain improper removal of an NSSCertificate
structure from a trust domain (CVE-2014-1544).
The updated packages have been upgraded to the latest NSS (3.16.3)
versions which is not vulnerable to this issue.
The nss 3.16.1 update done as part of MDVSA-2014:125 introduced a
regression because of the upstream change: 'Imposed name constraints
on the French government root CA ANSSI (DCISS)' The change wont work
as currently implemented as the French government root CA signs more
than 'gouv.fr' domains. So for now we revert that change until its
properly fixed upstream (mga#13563).
Additionally the rootcerts package has also been updated to the
latest version as of 2014-07-03, which adds, removes, and distrusts
several certificates.
______________________________
References:
http://cve.mitre.org/cgi-bin/
https://www.mozilla.org/
https://developer.mozilla.org/
https://developer.mozilla.org/
http://advisories.mageia.org/
https://bugs.mageia.org/show_
______________________________
Updated Packages:
Mandriva Business Server 1/X86_64:
ee813ae98832fb500a2386774dd65e
7e6cd7d9ec791afebdd84826f518bc
04c85e66b53841e820da089de92ab5
feb8f768259ff375b3579e655c8c09
36b8861059cf3f6549862287a7ec72
3fa04f2f2e215315e53ba5eaea7b24
1fa99d3cf851a0c76e554bc17b42f1
d373bdf6e499f7ec8db4ae14acf5c7
c54d7022458cefdefaf6a8d1fb8978
______________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/en/
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
Komentarų nėra:
Rašyti komentarą