[<prev] [next>] [day] [month] [year] [list]
Message-Id: <E1YcW0C-0005UR-Cx@titan.mandriva.com>
Date: Mon, 30 Mar 2015 11:29:00 +0200
From: security@...driva.com
To: bugtraq@...urityfocus.com
Subject: [ MDVSA-2015:179 ] coreutils
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
_______________________________________________________________________
Mandriva Linux Security Advisory MDVSA-2015:179
http://www.mandriva.com/en/support/security/
_______________________________________________________________________
Package : coreutils
Date : March 30, 2015
Affected: Business Server 1.0, Business Server 2.0
_______________________________________________________________________
Problem Description:
Updated coreutils packages fix security vulnerability:
Bertrand Jacquin and Fiedler Roman discovered date and touch
incorrectly handled user-supplied input. An attacker could possibly
use this to cause a denial of service or potentially execute code
(CVE-2014-9471).
_______________________________________________________________________
References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9471
http://advisories.mageia.org/MGASA-2015-0029.html
_______________________________________________________________________
Updated Packages:
Mandriva Business Server 1/X86_64:
e57ac9d21b8cd869845ebd0068cc00dd mbs1/x86_64/coreutils-8.15-3.2.mbs1.x86_64.rpm
41cbfd54c9aaec5e55c10ce8f9bd50ac mbs1/x86_64/coreutils-doc-8.15-3.2.mbs1.noarch.rpm
3b0c14b44630987ec57869fe21e97d93 mbs1/SRPMS/coreutils-8.15-3.2.mbs1.src.rpm
Mandriva Business Server 2/X86_64:
14b8f79d6149a143e3d114bb3ad0e6af mbs2/x86_64/coreutils-8.21-8.1.mbs2.x86_64.rpm
a5b5f4f7c12db82afb17f62e2ae369ba mbs2/x86_64/coreutils-doc-8.21-8.1.mbs2.noarch.rpm
bd4be75011bb4d6586d3556b27b882f3 mbs2/SRPMS/coreutils-8.21-8.1.mbs2.src.rpm
_______________________________________________________________________
To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.
All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:
gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98
You can view other update advisories for Mandriva Linux at:
http://www.mandriva.com/en/support/security/advisories/
If you want to report vulnerabilities, please contact
security_(at)_mandriva.com
_______________________________________________________________________
Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
iD8DBQFVGQlrmqjQ0CJFipgRAuZ1AKCJ8c7Myv4rg8gvuIz4rZWBpVyCOACfYpI/
Ykj2prin4CbYGsV/Xw4PePo=
=VHCl
-----END PGP SIGNATURE-----
Powered by blists - more mailing lists