http://www.mandriva.com/en/
______________________________
Package : coreutils
Date : March 30, 2015
Affected: Business Server 1.0, Business Server 2.0
______________________________
Problem Description:
Updated coreutils packages fix security vulnerability:
Bertrand Jacquin and Fiedler Roman discovered date and touch
incorrectly handled user-supplied input. An attacker could possibly
use this to cause a denial of service or potentially execute code
(CVE-2014-9471).
______________________________
References:
http://cve.mitre.org/cgi-bin/
http://advisories.mageia.org/
______________________________
Updated Packages:
Mandriva Business Server 1/X86_64:
e57ac9d21b8cd869845ebd0068cc00
41cbfd54c9aaec5e55c10ce8f9bd50
3b0c14b44630987ec57869fe21e97d
Mandriva Business Server 2/X86_64:
14b8f79d6149a143e3d114bb3ad0e6
a5b5f4f7c12db82afb17f62e2ae369
bd4be75011bb4d6586d3556b27b882
______________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/en/
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
Komentarų nėra:
Rašyti komentarą