Executive Summary

Informations
NameMDVSA-2015:211First vendor Publication2015-04-27
VendorMandrivaLast vendor Modification2015-04-27
Severity (Vendor) N/ARevisionN/A

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:N/I:N/A:P)
Cvss Base Score5Attack RangeNetwork
Cvss Impact Score2.9Attack ComplexityLow
Cvss Expoit Score10AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores

Detail

Updated glusterfs packages fix security vulnerability:

glusterfs was vulnerable to a fragment header infinite loop denial of service attack (CVE-2014-3619).

Also, the glusterfsd SysV init script was failing to properly start the service. This was fixed by replacing it with systemd unit files for the service that work properly (mga#14049).

Original Source

Url : http://www.mandriva.com/security/advisories?name=MDVSA-2015:211

CWE : Common Weakness Enumeration

%idName
100 %CWE-399Resource Management Errors

CPE : Common Platform Enumeration

TypeDescriptionCount
Application1
Os1

Nessus® Vulnerability Scanner

DateDescription
2015-04-28Name : The remote Mandriva Linux host is missing one or more security updates.
File : mandriva_MDVSA-2015-211.nasl - Type : ACT_GATHER_INFO
2015-03-20Name : The remote openSUSE host is missing a security update.
File : openSUSE-2015-241.nasl - Type : ACT_GATHER_INFO
2015-03-12Name : The remote openSUSE host is missing a security update.
File : openSUSE-2015-219.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
DateInformations
2015-04-29 13:28:50
  • Multiple Updates
2015-04-27 17:25:00
  • First insertion