You are here
Home > Preporuke > Sigurnosni nedostatak programskog paketa libtasn1

Sigurnosni nedostatak programskog paketa libtasn1

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LMV

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA1

_______________________________________________________________________

Mandriva Linux Security Advisory MDVSA-2015:193
http://www.mandriva.com/en/support/security/
_______________________________________________________________________

Package : libtasn1
Date : April 7, 2015
Affected: Business Server 1.0, Business Server 2.0
_______________________________________________________________________

Problem Description:

Updated libtasn1 packages fix security vulnerability:

The libtasn1 library before version 4.4 is vulnerable to a two-byte
stack overflow in asn1_der_decoding (CVE-2015-2806).
_______________________________________________________________________

References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2806
http://advisories.mageia.org/MGASA-2015-0128.html
_______________________________________________________________________

Updated Packages:

Mandriva Business Server 1/X86_64:
6ee218bbcdcab7a72ec65bdc1834abaa mbs1/x86_64/lib64tasn1_6-3.6-1.4.mbs1.x86_64.rpm
8658c2d4f0e2b6e070805e7ba5e4cce2 mbs1/x86_64/lib64tasn1-devel-3.6-1.4.mbs1.x86_64.rpm
9cc7c6fe381bc2db952d614ab78be47b mbs1/x86_64/libtasn1-tools-3.6-1.4.mbs1.x86_64.rpm
f80b17e487f25f2f9c244659a8b0cbd4 mbs1/SRPMS/libtasn1-3.6-1.4.mbs1.src.rpm

Mandriva Business Server 2/X86_64:
452e7cf5aa083a71ebdf29af9e2467b0 mbs2/x86_64/lib64tasn1_6-3.6-1.1.mbs2.x86_64.rpm
3eb4b875698d9337bcd7c5e7b4020a1a mbs2/x86_64/lib64tasn1-devel-3.6-1.1.mbs2.x86_64.rpm
dc765aefadf100bb081ea4afca50a0ae mbs2/x86_64/libtasn1-tools-3.6-1.1.mbs2.x86_64.rpm
eb137da8b02d8c317a7b61f478a1a86e mbs2/SRPMS/libtasn1-3.6-1.1.mbs2.src.rpm
_______________________________________________________________________

To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg –recv-keys –keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/en/support/security/advisories/

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com
_______________________________________________________________________

Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1.4.12 (GNU/Linux)

iD8DBQFVI2xDmqjQ0CJFipgRAmtbAKCZH3+aCSqO/L5MDWufcMRf/CU3yQCfQTLC
unT0WfjUR7iNhkI2kBGluPA=
=vts2
—–END PGP SIGNATURE—–

To unsubscribe, send a email to sympa@mandrivalinux.org
with this subject : unsubscribe security-announce
_______________________________________________________
Want to buy your Pack or Services from Mandriva?
Go to http://store.mandriva.com
_______________________________________________________

AutorMarko Stanec
Cert idNCERT-REF-2015-04-0008-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
Izvorhttp://www.adobe.com/
Top
More in Preporuke
Sigurnosni nedostatak programskog paketa django

Otkriven je sigurnosni nedostatak u programskom paketu django za operacijski sustav Mandriva. Otkriveni nedostatak potencijalnim napadačima omogućuje izvođenje XSS napada....

Close