http://www.mandriva.com/en/
______________________________
Package : krb5
Date : January 8, 2015
Affected: Business Server 1.0
______________________________
Problem Description:
Updated krb5 packages fix security vulnerability:
In MIT krb5, when kadmind is configured to use LDAP for the KDC
database, an authenticated remote attacker can cause a NULL dereference
by attempting to use a named ticket policy object as a password policy
for a principal. The attacker needs to be authenticated as a user
who has the elevated privilege for setting password policy by adding
or modifying principals (CVE-2014-5353).
______________________________
References:
http://cve.mitre.org/cgi-bin/
http://advisories.mageia.org/
______________________________
Updated Packages:
Mandriva Business Server 1/X86_64:
cf5cbf417079cc29f5d7dc875dc570
9c5e276725d9619cef2ad2463f2d52
631e8c968032d5e7441ee434162fd9
832bf5690fd75113a2ba13c7de00b7
838ffbbe902c9a9d4783fe8d97d5f3
be8e708b5ef58547edec9450f01b48
2bc6acd8eeed4feba005052dc03677
4269868ffaa1e93884f18b5820354d
______________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/en/
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
Komentarų nėra:
Rašyti komentarą