http://www.mandriva.com/en/
______________________________
Package : gcc
Date : March 30, 2015
Affected: Business Server 2.0
______________________________
Problem Description:
Updated gcc packages fix the following security issue:
Multiple integer overflow issues were found in libgfortran, the
run-time support library for the Fortran compiler. These could possibly
be used to crash a Fortran application or cause it to execute arbitrary
code CVE-2014-5044).
They also fix the following bugs:
The gcc rtl-optimization sched2 miscompiles syscall sequence wich
can cause random panic in glibc and kernel (gcc/PR61801)
clang++ fails to find cxxabi.h and cxxabi_tweaks.h during build
(mga#13543)
______________________________
References:
http://cve.mitre.org/cgi-bin/
http://advisories.mageia.org/
______________________________
Updated Packages:
Mandriva Business Server 2/X86_64:
ba6459e361ef674646c7c4c9dbb7bc
4931854eae0f31c0692fd02529cdb2
06d81754cc48c49ecf453bb1016c07
36412262a678f4180641754f0331b1
ce7727c770409270fe59da4459bce5
283e870ad330408eaf500e9bee543d
03045262f7a3772062e676587b17df
abeae6b9f2361cb5a930551dceb520
b50e3e67d3c6542e93826d91faa952
c58e9435e5f0f9b92954ca609cca09
c5bf6d07d3096fcc99ccba1cbaa8d9
50d15d7bd78675abbe87c5410b1813
83b5a52d9f232b739818fdb6dacf1c
9eacc2a8bdbcfc3688ca1e92bb5203
da6de30ec90f20a91d97dff2dfabcc
703709c2995a8493e01a4bede882b6
9c29e871dc33ae226f72fce01d0699
f8e1128a346c13a30da8d9e2093be2
551a21703f62c6ca434010eb315328
5300b338ee1b78be849644c4bbcc3e
48e82623a5b3c25eed4914642e178f
dcc2346374a1e293ca90425b48b229
6c488c65cdaf1f35623dd138db0942
cdf7cc896cb02bb3a8a468d3618135
2b66c7207f002a2847b85dac2bbe28
c3afd2ddc6cd6c67bc9e22ec988ee8
c02c7a1a19b45abf54b21bc45b6684
0d8837075cc22def07d34843bb0695
88fde39165d0f5d301efcbaf52753a
ffcad7fa410ee670701207b9ed7f63
f83f7c31e43b0cf9cd5358d14df29b
477874d761e9d5defa958d1bfca621
fee115f9249303074ba0099847832f
87f90458fa35e0092e55d047536166
58f0d2c67eba4e233f0a0d3457d378
625181b8fca022e2b6fa201ac58174
11aa798cc7ec61fc2f2331de28ced1
a6446a827c6f6f63de42dfc4e5de30
82a7116c7ed0d9e47ef0aac472120c
d418516d321b7dc42ea2a8434f75d3
a5bddc5fec6d4314a162a5dcabdfbe
______________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/en/
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
Komentarų nėra:
Rašyti komentarą