Mandriva Linux Security Advisory MDVSA-2015:074
http://www.mandriva.com/en/
______________________________
Package : openldap
Date : March 27, 2015 Affected: Business Server 1.0
______________________________
Problem Description:
A vulnerability has been discovered and corrected in openldap:
The deref_parseCtrl function in servers/slapd/overlays/deref.c in
OpenLDAP 2.4.13 through 2.4.40 allows remote attackers to cause a
denial of service (NULL pointer dereference and crash) via an empty
attribute list in a deref control in a search request (CVE-2015-1545).
The updated packages provides a solution for these security issues.
______________________________
References:
http://cve.mitre.org/cgi-bin/
______________________________
Updated Packages:
Mandriva Business Server 1/X86_64:
f3d273a0c95e56257e22eaf18cee67
52027b79a75fb4079922abb6d81188
2b995254554c7b0eedd11582be51bb
69e95a83d160585836c442956ab363
73c277441c0306b03133c17fea8b8c
30294a4d6ff5598198f7cdd9d2bea0
b43adb7168e7fe719cd980003c1be7
090de690808dc5e432a372349acd40
f0cc189b31a629302488840eb12eb7
1887cf299db014a962c8c71373da11
______________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/en/
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
Komentarų nėra:
Rašyti komentarą