http://www.mandriva.com/en/
______________________________
Package : libtasn1
Date : April 7, 2015
Affected: Business Server 1.0, Business Server 2.0
______________________________
Problem Description:
Updated libtasn1 packages fix security vulnerability:
The libtasn1 library before version 4.4 is vulnerable to a two-byte
stack overflow in asn1_der_decoding (CVE-2015-2806).
______________________________
References:
http://cve.mitre.org/cgi-bin/
http://advisories.mageia.org/
______________________________
Updated Packages:
Mandriva Business Server 1/X86_64:
6ee218bbcdcab7a72ec65bdc1834ab
8658c2d4f0e2b6e070805e7ba5e4cc
9cc7c6fe381bc2db952d614ab78be4
f80b17e487f25f2f9c244659a8b0cb
Mandriva Business Server 2/X86_64:
452e7cf5aa083a71ebdf29af9e2467
3eb4b875698d9337bcd7c5e7b4020a
dc765aefadf100bb081ea4afca50a0
eb137da8b02d8c317a7b61f478a1a8
______________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/en/
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
Komentarų nėra:
Rašyti komentarą