U radu programskog paketa mono, na operacijskom sustavu Fedora 14, ispravljeni su novi sigurnosni nedostaci. Radi se o paketu otvorenog programskog koda koji omogućuje stvaranje i pokretanje .NET aplikacija na operacijskim sustavima Unix/Linux. Nedostaci su posljedica nepravilnosti koja nastaje prilikom učitavanja biblioteka u trenutnom direktoriju i neodgovarajuće provjere određenih argumenata. Zlonamjerni, lokalni korisnici tako mogu pokretati proizvoljan programski kod te stjecati dodatne ovlasti na ranjivom sustavu. Svim se korisnicima savjetuje primjena odgovarajuće nadogradnje.
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2011-3393
2011-03-15 21:10:35
--------------------------------------------------------------------------------
Name : mono
Product : Fedora 14
Version : 2.6.7
Release : 4.fc14
URL : http://www.mono-project.com/Main_Page
Summary : A .NET runtime environment
Description :
The Mono runtime implements a JIT engine for the ECMA CLI
virtual machine (as well as a byte code interpreter, the
class loader, the garbage collector, threading system and
metadata access libraries.
--------------------------------------------------------------------------------
Update Information:
* CVE-2010-4159
* CVE-2010-4254
* mono-core and mono-addins do not depend on mono-devel anymore
--------------------------------------------------------------------------------
ChangeLog:
* Tue Mar 15 2011 Christian Krause <Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.> - 2.6.7-4
- Move xbuild.exe and dependencies into -devel sub-package (BZ 671917)
- Ensure that the symbolic links and the actual libraries in the GAC are
always in the same sub-package
- CVE-2010-4159 (BZ 654405)
- CVE-2010-4254 (BZ 659911)
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #654403 - CVE-2010-4159 mono: untrusted search path vulnerability
https://bugzilla.redhat.com/show_bug.cgi?id=654403
[ 2 ] Bug #659910 - CVE-2010-4254 mono: vulnerability when Moonlight is used
may allow arbitrary code execution
https://bugzilla.redhat.com/show_bug.cgi?id=659910
--------------------------------------------------------------------------------
This update can be installed with the "yum" update program. Use
su -c 'yum update mono' at the command line.
For more information, refer to "Managing Software with yum",
available at http://docs.fedoraproject.org/yum/.
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________
package-announce mailing list
Ova e-mail adresa je zaštićena od spambota. Potrebno je omogućiti JavaScript da je vidite.
https://admin.fedoraproject.org/mailman/listinfo/package-announce
Posljednje sigurnosne preporuke