Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:31140
HistoryOct 05, 2014 - 12:00 a.m.

[ MDVSA-2014:191 ] perl-XML-DT

2014-10-0500:00:00
vulners.com
18

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


Mandriva Linux Security Advisory MDVSA-2014:191
http://www.mandriva.com/en/support/security/


Package : perl-XML-DT
Date : September 29, 2014
Affected: Business Server 1.0


Problem Description:

Updated perl-XML-DT package fixes security vulnerability:

The mkxmltype and mkdtskel scripts provided in perl-XML-DT allow
local users to overwrite arbitrary files via a symlink attack on a
/tmp/xml##### temporary file (CVE-2014-5260).


References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5260
http://advisories.mageia.org/MGASA-2014-0390.html


Updated Packages:

Mandriva Business Server 1/X86_64:
e1d6216fcb3be05db063cf27f7fa0592 mbs1/x86_64/perl-XML-DT-0.660.0-1.mbs1.noarch.rpm
759d5fc8160a1cff2669e44dbc917ecc mbs1/SRPMS/perl-XML-DT-0.660.0-1.mbs1.src.rpm


To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/en/support/security/advisories/

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com


Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)

iD8DBQFUKVnmmqjQ0CJFipgRAnFhAKDaAFzGwS7VAfZVZsoM7CQxkTE9VACfXR3M
zTAqwG2dcm9zoO1uYgDSuGo=
=sx0Z
-----END PGP SIGNATURE-----