Mandriva Linux Security Advisory MDVSA-2015:117
http://www.mandriva.com/en/
______________________________
Package : emacs
Date : March 29, 2015
Affected: Business Server 2.0
______________________________
Problem Description:
Updated emacs packages fix security vulnerabilities:
Steve Kemp discovered multiple temporary file handling issues in
Emacs. A local attacker could use these flaws to perform symbolic link
attacks against users running Emacs (CVE-2014-3421, CVE-2014-3422,
CVE-2014-3423, CVE-2014-3424).
______________________________
References:
http://cve.mitre.org/cgi-bin/
http://cve.mitre.org/cgi-bin/
http://cve.mitre.org/cgi-bin/
http://cve.mitre.org/cgi-bin/
http://advisories.mageia.org/
______________________________
Updated Packages:
Mandriva Business Server 2/X86_64:
d9f008f7b320e274f828f4e3c12f87
f0a641e5e2f16a28daeafa623c0fd1
c367752961a74f31e1b8111f8e3637
0e0536e56c6a7f94cd52ed72908ca4
a5d5e9f3bd2e77b4a8094c4e7b1474
14ffc339e2302b0252e0e82148c7ee
ecef0a2fcec34515d8243558d9dc91
______________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/en/
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
Komentarų nėra:
Rašyti komentarą