http://www.mandriva.com/en/
______________________________
Package : graphviz
Date : December 14, 2014
Affected: Business Server 1.0
______________________________
Problem Description:
Updated graphviz packages fix security vulnerability:
Format string vulnerability in the yyerror function in
lib/cgraph/scan.l in Graphviz allows remote attackers to have
unspecified impact via format string specifiers in unknown vector,
which are not properly handled in an error string (CVE-2014-9157).
______________________________
References:
http://cve.mitre.org/cgi-bin/
http://advisories.mageia.org/
______________________________
Updated Packages:
Mandriva Business Server 1/X86_64:
3914f2ea0cc964221c07b6b27246fa
5853ee99ae3bd2ae77a39ee5fc2b3a
3e546dc38c33ea1fc6fb88cfdda744
865e9476539dd9aaf8d6dfc9ee2145
b0c036687d1ce1e5e097a04811fe86
a206f4a2af9a68e39e0fd878b0cd15
63f512422c8364f59b21b6b3f8699a
99d0ef333690abdb5b315c1a08bd98
ae0e7e1a9553301f5ca95823e94c33
8a7b1e6cf323707b4c33c1658c1a29
696ba1406e68c5b3de15749e4f0e78
c68073de72515035ac978922ec8fa8
27338fd7e937793c97fb02fdd76828
265496551e62b78ffc7bb762b75c3e
3c76c71d55bae5c89fde5e8cdd5871
ad084e55bdfa51c4ad3e83853fa155
27dee6a16934bcf15f78d20ebaa936
ae7e2f8ba356f47776705930554a96
f0a96b284ef58704ce38ea485f2efa
34624e4bc4febcf4a08933e1a29a09
______________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/en/
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
Komentarų nėra:
Rašyti komentarą