drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Pufferüberlauf in libtasn1
Name: |
Pufferüberlauf in libtasn1 |
|
ID: |
MDVSA-2015:193 |
|
Distribution: |
Mandriva |
|
Plattformen: |
Mandriva Business Server 1.0, Mandriva Business Server 2.0 |
|
Datum: |
Di, 7. April 2015, 11:36 |
|
Referenzen: |
http://advisories.mageia.org/MGASA-2015-0128.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2806 |
|
Applikationen: |
GNU Libtasn1 |
|
Originalnachricht |
This is a multi-part message in MIME format...
------------=_1428392370-3367-2
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
_______________________________________________________________________
Mandriva Linux Security Advisory MDVSA-2015:193 http://www.mandriva.com/en/support/security/ _______________________________________________________________________
Package : libtasn1 Date : April 7, 2015 Affected: Business Server 1.0, Business Server 2.0 _______________________________________________________________________
Problem Description:
Updated libtasn1 packages fix security vulnerability: The libtasn1 library before version 4.4 is vulnerable to a two-byte stack overflow in asn1_der_decoding (CVE-2015-2806). _______________________________________________________________________
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2806 http://advisories.mageia.org/MGASA-2015-0128.html _______________________________________________________________________
Updated Packages:
Mandriva Business Server 1/X86_64: 6ee218bbcdcab7a72ec65bdc1834abaa mbs1/x86_64/lib64tasn1_6-3.6-1.4.mbs1.x86_64.rpm 8658c2d4f0e2b6e070805e7ba5e4cce2 mbs1/x86_64/lib64tasn1-devel-3.6-1.4.mbs1.x86_64.rpm 9cc7c6fe381bc2db952d614ab78be47b mbs1/x86_64/libtasn1-tools-3.6-1.4.mbs1.x86_64.rpm f80b17e487f25f2f9c244659a8b0cbd4 mbs1/SRPMS/libtasn1-3.6-1.4.mbs1.src.rpm
Mandriva Business Server 2/X86_64: 452e7cf5aa083a71ebdf29af9e2467b0 mbs2/x86_64/lib64tasn1_6-3.6-1.1.mbs2.x86_64.rpm 3eb4b875698d9337bcd7c5e7b4020a1a mbs2/x86_64/lib64tasn1-devel-3.6-1.1.mbs2.x86_64.rpm dc765aefadf100bb081ea4afca50a0ae mbs2/x86_64/libtasn1-tools-3.6-1.1.mbs2.x86_64.rpm eb137da8b02d8c317a7b61f478a1a86e mbs2/SRPMS/libtasn1-3.6-1.1.mbs2.src.rpm _______________________________________________________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/en/support/security/advisories/
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com _______________________________________________________________________
Type Bits/KeyID Date User ID pub 1024D/22458A98 2000-07-10 Mandriva Security Team <security*mandriva.com> -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux)
iD8DBQFVI2xDmqjQ0CJFipgRAmtbAKCZH3+aCSqO/L5MDWufcMRf/CU3yQCfQTLC unT0WfjUR7iNhkI2kBGluPA= =vts2 -----END PGP SIGNATURE-----
------------=_1428392370-3367-2 Content-Type: text/plain; charset="UTF-8"; name="message-footer.txt" Content-Disposition: inline; filename="message-footer.txt" Content-Transfer-Encoding: 8bit
To unsubscribe, send a email to sympa@mandrivalinux.org with this subject : unsubscribe security-announce _______________________________________________________ Want to buy your Pack or Services from Mandriva? Go to http://store.mandriva.com _______________________________________________________
------------=_1428392370-3367-2--
|
|
|
|