http://www.mandriva.com/en/
______________________________
Package : dovecot
Date : March 29, 2015
Affected: Business Server 2.0
______________________________
Problem Description:
Updated dovecot packages fix security vulnerability.
Dovecot before 2.2.13 is vulnerable to a DoS attack against
imap/pop3-login processes. If SSL/TLS handshake was started but
wasn't finished, the login process attempted to eventually forcibly
disconnect the client, but failed to do it correctly. This could have
left the connections hanging around for a long time (CVE-2014-3430).
______________________________
References:
http://cve.mitre.org/cgi-bin/
http://advisories.mageia.org/
______________________________
Updated Packages:
Mandriva Business Server 2/X86_64:
1eb6e9066872c78e1755c1971036fc
656bf9481ba301e634d6a726f794dd
25eba263e3a69fe651c0ed63379498
67c9662509cf9fa64d129d846c0662
11c9627af2b38d1935527942a3e668
dfc56f23f07520c804b8af8688abdb
3ce270a44b749aef02b65b717518e9
3610ca4c251604b05101401712af16
9abe3f4567e180fcd9cbeaf0af8ea4
7d92ecbc2cb08e9591cd9b1be0326f
______________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/en/
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
Komentarų nėra:
Rašyti komentarą