http://www.mandriva.com/en/
______________________________
Package : file
Date : November 28, 2014
Affected: Business Server 1.0
______________________________
Problem Description:
Updated file packages fix security vulnerability:
An out-of-bounds read flaw was found in file's donote() function in the
way the file utility determined the note headers of a elf file. This
could possibly lead to file executable crash (CVE-2014-3710).
______________________________
References:
http://cve.mitre.org/cgi-bin/
http://advisories.mageia.org/
______________________________
Updated Packages:
Mandriva Business Server 1/X86_64:
a689b2da47e9274ea7349ed0d157b6
c5a8f1ff46aa31ee55e8e0ad7b96c6
8ceaf42463a9416772391b28752ed0
aa11fa0317a5a05020f33682543131
b03c003df1f64b8c02232a875250d3
7c62d89d961c176c92a9afc3fbef53
______________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/en/
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
Komentarų nėra:
Rašyti komentarą