|Category:||Mageia Linux Local Security Checks|
|Title:||Mageia Linux Local Check: mgasa-2015-0446|
|Summary:||Mageia Linux Local Security Checks mgasa-2015-0446|
Mageia Linux Local Security Checks mgasa-2015-0446
Updated krb5 packages fix security vulnerabilities: In any MIT krb5 release with the patches for CVE-2015-2696 applied, an application which calls gss_export_sec_context() may experience memory corruption if the context was established using the IAKERB mechanism. Historically, some vulnerabilities of this nature can be translated into remote code execution, though the necessary exploits must be tailored to the individual application and are usually quite complicated (CVE-2015-2698).
Update the affected packages to the latest available version.
Common Vulnerability Exposure (CVE) ID: CVE-2015-2698|
SuSE Security Announcement: openSUSE-SU-2015:2055 (Google Search)
SuSE Security Announcement: openSUSE-SU-2015:2376 (Google Search)
|Copyright||Copyright (C) 2015 Eero Volotinen|
|This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.