http://www.mandriva.com/en/
______________________________
Package : libtasn1
Date : May 8, 2015
Affected: Business Server 1.0, Business Server 2.0
______________________________
Problem Description:
Updated libtasn1 packages fix security vulnerability:
A malformed certificate input could cause a heap overflow read in the
DER decoding functions of Libtasn1. The heap overflow happens in the
function _asn1_extract_der_octet() (CVE-2015-3622).
______________________________
References:
http://cve.mitre.org/cgi-bin/
http://advisories.mageia.org/
______________________________
Updated Packages:
Mandriva Business Server 1/X86_64:
4bc7773a89eaf2b4a604b109a92d07
930100232484cf13e36dfac29fa173
5bd5f7ea2ffd134e87bca1b91d49c6
6cfc88e6b24f8297ce5a7bc7d6d035
Mandriva Business Server 2/X86_64:
b5a3ffa1c79eb3aad4895d4b99ed59
f16c5434df06bcc5c4528ef85bca22
6778a6b9107dc7617641527c58f4e3
16d66ba91bb3f49c24db63704610cf
______________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/en/
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
Komentarų nėra:
Rašyti komentarą