CVE-2015-2301 (php)

Use-after-free vulnerability in the phar_rename_archive function in phar_object.c in PHP before 5.5.22 and 5.6.x before 5.6.6 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger an attempted renaming of a Phar archive to the name of an existing file.

CVE-2015-2305 (rxspencer)

Integer overflow in the regcomp implementation in the Henry Spencer BSD regex library (aka rxspencer) alpha3.8.g5 on 32-bit platforms, as used in NetBSD through 6.1.5 and other products, might allow context-dependent attackers to execute arbitrary code via a large regular expression that leads to a heap-based buffer overflow.

CVE-2015-2331 (libzip, php)

Integer overflow in the _zip_cdir_new function in zip_dirent.c in libzip 0.11.2 and earlier, as used in the ZIP extension in PHP before 5.4.39, 5.5.x before 5.5.23, and 5.6.x before 5.6.7 and other products, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a ZIP archive that contains many entries, leading to a heap-based buffer overflow.

CVE-2015-2348 (php)

The move_uploaded_file implementation in ext/standard/basic_functions.c in PHP before 5.4.39, 5.5.x before 5.5.23, and 5.6.x before 5.6.7 truncates a pathname upon encountering a x00 character, which allows remote attackers to bypass intended extension restrictions and create files with unexpected names via a crafted second argument. NOTE: this vulnerability exists because of an incomplete fix for CVE-2006-7243.

CVE-2015-2787 (php)

Use-after-free vulnerability in the process_nested_data function in ext/standard/var_unserializer.re in PHP before 5.4.39, 5.5.x before 5.5.23, and 5.6.x before 5.6.7 allows remote attackers to execute arbitrary code via a crafted unserialize call that leverages use of the unset function within an __wakeup function, a related issue to CVE-2015-0231.

[ MDVSA-2015:180 ] apache-mod_wsgi

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________

 Mandriva Linux Security Advisory                         MDVSA-2015:180
 http://www.mandriva.com/en/support/security/
 _______________________________________________________________________

 Package : apache-mod_wsgi
 Date    : March 30, 2015
 Affected: Business Server 2.0
 _______________________________________________________________________

 Problem Description:

 Updated apache-mod_wsgi package fixes security vulnerabilities:
 
 apache-mod_wsgi before 4.2.4 contained an off-by-one error in
 applying a limit to the number of supplementary groups allowed for
 a daemon process group. The result could be that if more groups
 than the operating system allowed were specified to the option
 supplementary-groups, then memory corruption or a process crash
 could occur.
 
 It was discovered that mod_wsgi incorrectly handled errors when
 setting up the working directory and group access righ

[ MDVSA-2015:029-1 ] binutils

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________

 Mandriva Linux Security Advisory                       MDVSA-2015:029-1
 http://www.mandriva.com/en/support/security/
 _______________________________________________________________________

 Package : binutils
 Date    : March 30, 2015
 Affected: Business Server 2.0
 _______________________________________________________________________

 Problem Description:

 Multiple vulnerabilities has been found and corrected in binutils:
 
 Multiple integer overflows in the (1) _objalloc_alloc function in
 objalloc.c and (2) objalloc_alloc macro in include/objalloc.h in GNU
 libiberty, as used by binutils 2.22, allow remote attackers to cause
 a denial of service (crash) via vectors related to the addition of
 CHUNK_HEADER_SIZE to the length, which triggers a heap-based buffer
 overflow (CVE-2012-3509).
 
 The srec_scan function in bfd/srec.c in libdbfd in GNU binutils
 before 2.25 allows remote 

[ MDVSA-2015:179 ] coreutils

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________

 Mandriva Linux Security Advisory                         MDVSA-2015:179
 http://www.mandriva.com/en/support/security/
 _______________________________________________________________________

 Package : coreutils
 Date    : March 30, 2015
 Affected: Business Server 1.0, Business Server 2.0
 _______________________________________________________________________

 Problem Description:

 Updated coreutils packages fix security vulnerability:
 
 Bertrand Jacquin and Fiedler Roman discovered date and touch
 incorrectly handled user-supplied input. An attacker could possibly
 use this to cause a denial of service or potentially execute code
 (CVE-2014-9471).
 _______________________________________________________________________

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-9471
 http://advisories.mageia.org/MGASA-2015-0029.html
 ______________________________________

[ MDVSA-2015:178 ] ctags

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________

 Mandriva Linux Security Advisory                         MDVSA-2015:178
 http://www.mandriva.com/en/support/security/
 _______________________________________________________________________

 Package : ctags
 Date    : March 30, 2015
 Affected: Business Server 2.0
 _______________________________________________________________________

 Problem Description:

 Updated ctags package fixes security vulnerability:
 
 A denial of service issue was discovered in ctags 5.8. A remote
 attacker could cause excessive CPU usage and disk space consumption
 via a crafted JavaScript file by triggering an infinite loop
 (CVE-2014-7204).
 _______________________________________________________________________

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7204
 http://advisories.mageia.org/MGASA-2014-0415.html
 ____________________________________________________________________