Mandriva Linux Security Advisory MDVSA-2015:218
http://www.mandriva.com/en/
______________________________
Package : glibc
Date : April 30, 2015
Affected: Business Server 1.0, Business Server 2.0
______________________________
Problem Description:
Multiple vulnerabilities has been found and corrected in glibc:
It was discovered that, under certain circumstances, glibc's
getaddrinfo\(\) function would send DNS queries to random file
descriptors. An attacker could potentially use this flaw to send DNS
queries to unintended recipients, resulting in information disclosure
or data loss due to the application encountering corrupted data
(CVE-2013-7423).
A buffer overflow flaw was found in the way glibc's gethostbyname_r\(\)
and other related functions computed the size of a buffer when passed
a misaligned buffer as input. An attacker able to make an application
call any of these functions with a misaligned buffer could use this
flaw to crash the application or, potentially, execute arbitrary
code with the permissions of the user running the application
(CVE-2015-1781).
The updated packages provides a solution for these security issues.
______________________________
References:
http://cve.mitre.org/cgi-bin/
http://cve.mitre.org/cgi-bin/
https://rhn.redhat.com/errata/
______________________________
Updated Packages:
Mandriva Business Server 1/X86_64:
92aa475c44c712eaf19898ef76e041
606cdd33e041f9853eae18f53c9d73
133deb850840d464335e5c659cba16
7a3d5170647c52cd4a34d2dcda7113
96c842afb6110ac18a40b843b51548
703e73278d416a53096fe19c7652c9
12f09ed16d9c4b0f9a94e931569dac
09715361d0af4a4dd5fba44239c5e6
c9a293ac29070d215eb1988bba58aa
8d8b74de2d7c0e982e0ad82ac73091
Mandriva Business Server 2/X86_64:
e59cee8712d211add638c1b6c1952f
baf9e44f8c4f82c75a0154d44b6fce
f3eb6e3ed435f8a06dcffbfa7a4452
5df45f7cae82ef7d354fa14c7ac363
24ef48d58c7a4114068e7b70dbefad
5f67c12f02dbc3f4cbf78f1a8c7d5a
f24e67e1ed1b01e5305c28b3a9b028
bae4b399bc43be8af24ddd93257ca3
740d9b3d14292be8847da92243340b
______________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/en/
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
Komentarų nėra:
Rašyti komentarą