Login
Login-Name Passwort


 
Newsletter
Werbung

Sicherheit: Zahlenüberlauf in The GNU Privacy Guard
Aktuelle Meldungen Distributionen
Name: Zahlenüberlauf in The GNU Privacy Guard
ID: MDVSA-2015:214
Distribution: Mandriva
Plattformen: Mandriva Business Server 1.0, Mandriva Business Server 2.0
Datum: Mi, 29. April 2015, 16:42
Referenzen: http://advisories.mageia.org/MGASA-2015-0166.html

Originalnachricht

This is a multi-part message in MIME format...

------------=_1430317111-25802-1

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2015:214
http://www.mandriva.com/en/support/security/
_______________________________________________________________________

Package : libksba
Date : April 29, 2015
Affected: Business Server 1.0, Business Server 2.0
_______________________________________________________________________

Problem Description:

Updated libksba packages fix security vulnerabilities:

The libksba package has been updated to version 1.3.3, which fixes
an integer overflow in the DN decoder and a couple of other minor bugs.
_______________________________________________________________________

References:

http://advisories.mageia.org/MGASA-2015-0166.html
_______________________________________________________________________

Updated Packages:

Mandriva Business Server 1/X86_64:
abe289a7af246825d6221094e5178908
mbs1/x86_64/lib64ksba8-1.3.3-1.mbs1.x86_64.rpm
0f1e756f909333419b24f337f1c0a5ac
mbs1/x86_64/lib64ksba-devel-1.3.3-1.mbs1.x86_64.rpm
3ed124365fb6cde8b26f91384189a7aa mbs1/SRPMS/libksba-1.3.3-1.mbs1.src.rpm

Mandriva Business Server 2/X86_64:
1cf45c3e1715158b9536c27b907c1e7f
mbs2/x86_64/lib64ksba8-1.3.3-1.mbs2.x86_64.rpm
c5ff09d857e518a358e60d2015175bd8
mbs2/x86_64/lib64ksba-devel-1.3.3-1.mbs2.x86_64.rpm
e2f5eaec8979c6923ae294d85ed834e2 mbs2/SRPMS/libksba-1.3.3-1.mbs2.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/en/support/security/advisories/

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)

iD8DBQFVQNnRmqjQ0CJFipgRAtDBAJ0XYfAqfP3eiUNCnAUzJdYdj/iPFwCeKIN5
eDv7jvlocLzVYwdEez1Kxx4=
=TSzP
-----END PGP SIGNATURE-----


------------=_1430317111-25802-1
Content-Type: text/plain; charset="UTF-8";
name="message-footer.txt"
Content-Disposition: inline; filename="message-footer.txt"
Content-Transfer-Encoding: 8bit

To unsubscribe, send a email to sympa@mandrivalinux.org
with this subject : unsubscribe security-announce
_______________________________________________________
Want to buy your Pack or Services from Mandriva?
Go to http://store.mandriva.com
_______________________________________________________


------------=_1430317111-25802-1--
Pro-Linux
Traut euch!
Neue Nachrichten
Werbung