http://www.mandriva.com/en/
______________________________
Package : net-snmp
Date : May 6, 2015
Affected: Business Server 1.0, Business Server 2.0
______________________________
Problem Description:
Updated net-snmp packages fix security vulnerability:
It was discovered that the snmp_pdu_parse() function could leave
incompletely parsed varBind variables in the list of variables. A
remote, unauthenticated attacker could exploit this flaw to cause a
crash or, potentially, execute arbitrary code.
______________________________
References:
http://advisories.mageia.org/
______________________________
Updated Packages:
Mandriva Business Server 1/X86_64:
e9e6514a37583dcd8caf948a2975ee
d58a677b3359c3b9f2a6221bc71a40
506af7ceaea330ac9e6009e51f91a2
12b87dc4dbd4f7eac59ee150eeb7be
692233b0f7738441cee192c23917fc
5cb8de6d94a82083dec56b3c5fadf1
4d5d1e31fe98a83a25aca067797414
164283a0c2fc778853e04a0d96d851
76ff7eeefb6243ba23019170d5869a
7985facf83ea1000bee08b4904ab59
a9426c006bb7dba9befa25a6f17584
Mandriva Business Server 2/X86_64:
96933cae4f472807871a9380577379
43a621e48ec1a90f9d19d2e5c41b44
eb85a240ee2fdaf0e18186af603645
29293d70a79ac2c2f2d3b7498795d9
fb1d4d5cf0bd8bcd8507a9504f3cb1
84907f5a327dca8f65cfdbde383cf3
2645307f112b55f39cdce0770f2c4f
324e814089995d267057def7ac9fff
5f67cdc5934f817c00905d30d7c6f0
f6e73d5addff4491699759064e01d1
fa0385f2c4a1ef79f753a1d6cf5329
______________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/en/
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
Komentarų nėra:
Rašyti komentarą