http://www.mandriva.com/en/
______________________________
Package : libjpeg
Date : January 8, 2015
Affected: Business Server 1.0
______________________________
Problem Description:
Updated libjpeg packages fix security vulnerability:
Passing a specially crafted jpeg file to libjpeg-turbo could lead to
stack smashing (CVE-2014-9092).
______________________________
References:
http://cve.mitre.org/cgi-bin/
http://advisories.mageia.org/
______________________________
Updated Packages:
Mandriva Business Server 1/X86_64:
934098e2444c5f942811f51da38826
b9ec915d700a1c12b0c21350968cc8
138058de01921b431c26e33dbdca43
089eefad17c19aee992f784ef074ad
3fdcf03f198489d5375d7ea47abb85
f6c6d17126be388dca28f740c7df9e
______________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/en/
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
Komentarų nėra:
Rašyti komentarą