Login
Login-Name Passwort


 
Newsletter
Werbung

Sicherheit: Ausführen beliebiger Kommandos in coreutils
Aktuelle Meldungen Distributionen
Name: Ausführen beliebiger Kommandos in coreutils
ID: MDVSA-2015:179
Distribution: Mandriva
Plattformen: Mandriva Business Server 1.0, Mandriva Business Server 2.0
Datum: Mo, 30. März 2015, 11:43
Referenzen: http://advisories.mageia.org/MGASA-2015-0029.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9471

Originalnachricht

This is a multi-part message in MIME format...

------------=_1427707826-30609-12

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2015:179
http://www.mandriva.com/en/support/security/
_______________________________________________________________________

Package : coreutils
Date : March 30, 2015
Affected: Business Server 1.0, Business Server 2.0
_______________________________________________________________________

Problem Description:

Updated coreutils packages fix security vulnerability:

Bertrand Jacquin and Fiedler Roman discovered date and touch
incorrectly handled user-supplied input. An attacker could possibly
use this to cause a denial of service or potentially execute code
(CVE-2014-9471).
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9471
http://advisories.mageia.org/MGASA-2015-0029.html
_______________________________________________________________________

Updated Packages:

Mandriva Business Server 1/X86_64:
e57ac9d21b8cd869845ebd0068cc00dd
mbs1/x86_64/coreutils-8.15-3.2.mbs1.x86_64.rpm
41cbfd54c9aaec5e55c10ce8f9bd50ac
mbs1/x86_64/coreutils-doc-8.15-3.2.mbs1.noarch.rpm
3b0c14b44630987ec57869fe21e97d93 mbs1/SRPMS/coreutils-8.15-3.2.mbs1.src.rpm

Mandriva Business Server 2/X86_64:
14b8f79d6149a143e3d114bb3ad0e6af
mbs2/x86_64/coreutils-8.21-8.1.mbs2.x86_64.rpm
a5b5f4f7c12db82afb17f62e2ae369ba
mbs2/x86_64/coreutils-doc-8.21-8.1.mbs2.noarch.rpm
bd4be75011bb4d6586d3556b27b882f3 mbs2/SRPMS/coreutils-8.21-8.1.mbs2.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/en/support/security/advisories/

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)

iD8DBQFVGQlrmqjQ0CJFipgRAuZ1AKCJ8c7Myv4rg8gvuIz4rZWBpVyCOACfYpI/
Ykj2prin4CbYGsV/Xw4PePo=
=VHCl
-----END PGP SIGNATURE-----


------------=_1427707826-30609-12
Content-Type: text/plain; charset="UTF-8";
name="message-footer.txt"
Content-Disposition: inline; filename="message-footer.txt"
Content-Transfer-Encoding: 8bit

To unsubscribe, send a email to sympa@mandrivalinux.org
with this subject : unsubscribe security-announce
_______________________________________________________
Want to buy your Pack or Services from Mandriva?
Go to http://store.mandriva.com
_______________________________________________________


------------=_1427707826-30609-12--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung