http://www.mandriva.com/en/
______________________________
Package : ppp
Date : May 4, 2015
Affected: Business Server 1.0, Business Server 2.0
______________________________
Problem Description:
Updated ppp packages fix security vulnerability:
Emanuele Rocca discovered that ppp was subject to a buffer
overflow when communicating with a RADIUS server. This would allow
unauthenticated users to cause a denial-of-service by crashing the
daemon (CVE-2015-3310).
______________________________
References:
http://cve.mitre.org/cgi-bin/
http://advisories.mageia.org/
______________________________
Updated Packages:
Mandriva Business Server 1/X86_64:
c28d026c6b9ae1f985ca7c5109ef56
853b81a9b1d592e658467554640cf6
7c457624130170f12836a84fda1fa2
9dbbdbc338c8984afcf37612c01e1c
371099157f976cbe1949d682122910
7ff2828d686af54549374a03ffea93
16d5cfcd40c8c6369478771f03bb4f
Mandriva Business Server 2/X86_64:
deac5a090724e3a14855493444d45b
b37a1eb9e8c2724c8a1f7c3067e119
8dd10576eafb33f8319a9c94d58d38
e6e5fc206b40ad9c4c0e2797bbc8c5
2d5ca03024e679a05db5e11ca895d5
a0ebca3353d892e621440d65154120
b57ffe76d0bc52ed10d5b0e2b6ae07
______________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/en/
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
Komentarų nėra:
Rašyti komentarą