Mandriva Linux Security Advisory MDVSA-2014:148
http://www.mandriva.com/en/
______________________________
Package : dbus
Date : July 31, 2014
Affected: Business Server 1.0
______________________________
Problem Description:
Updated dbus packages fix security vulnerabilities:
A flaw was reported in D-Bus's file descriptor passing feature. A
local attacker could use this flaw to cause a service or application
to disconnect from the bus, typically resulting in that service or
application exiting (CVE-2014-3532).
A flaw was reported in D-Bus's file descriptor passing feature. A local
attacker could use this flaw to cause an invalid file descriptor to be
forwarded to a service or application, causing it to disconnect from
the bus, typically resulting in that service or application exiting
(CVE-2014-3533).
______________________________
References:
http://cve.mitre.org/cgi-bin/
http://cve.mitre.org/cgi-bin/
http://advisories.mageia.org/
______________________________
Updated Packages:
Mandriva Business Server 1/X86_64:
3ec7d0230c9bba5579b6970e80e30b
0086d90124d84e60a09c70fa8e70ba
d126249502ee1a3819af4e5ae96001
17d4362c3888962ac3e402eacc5aac
8e46f1e7c2c5d4fb2ffc4fda7bfba5
df3ab9438c830215ad2b3597921d03
______________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/en/
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
Komentarų nėra:
Rašyti komentarą