http://www.mandriva.com/en/
______________________________
Package : bash
Date : September 24, 2014
Affected: Business Server 1.0
______________________________
Problem Description:
A flaw was found in the way Bash evaluated certain specially crafted
environment variables. An attacker could use this flaw to override or
bypass environment restrictions to execute shell commands. Certain
services and applications allow remote unauthenticated attackers to
provide environment variables, allowing them to exploit this issue
(CVE-2014-6271).
______________________________
References:
http://cve.mitre.org/cgi-bin/
https://rhn.redhat.com/errata/
______________________________
Updated Packages:
Mandriva Business Server 1/X86_64:
ee177bd2ef1c738689a7d04b166dc5
f73489d530f8c2467c4fa353bfbe61
062d5951a3a0bbbeb06fa292c8e399
______________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/en/
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
Komentarų nėra:
Rašyti komentarą