Resolved Bugs
1173064 – CVE-2014-9221 strongswan: denial-of-service vulnerability in libtls when processing crafted Key Exchange payload
1178957 – CVE-2014-9221 strongswan: denial-of-service vulnerability in libtls when processing crafted Key Exchange payload [epel-all]<br
Fixes CVE-2014-9221 denial-of-service vulnerability.
Monthly Archives: March 2015
[ MDVSA-2015:099 ] python-pillow
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 _______________________________________________________________________ Mandriva Linux Security Advisory MDVSA-2015:099 http://www.mandriva.com/en/support/security/ _______________________________________________________________________ Package : python-pillow Date : March 28, 2015 Affected: Business Server 2.0 _______________________________________________________________________ Problem Description: Updated python-imaging packages fix security vulnerabilities: Jakub Wilk discovered that temporary files were insecurely created (via mktemp()) in the IptcImagePlugin.py, Image.py, JpegImagePlugin.py, and EpsImagePlugin.py files of Python Imaging Library. A local attacker could use this flaw to perform a symbolic link attack to modify an arbitrary file accessible to the user running an application that uses the Python Imaging Library (CVE-2014-1932). Jakub Wilk discovered that temporary files created in the Jpeg
[ MDVSA-2015:098 ] curl
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 _______________________________________________________________________ Mandriva Linux Security Advisory MDVSA-2015:098 http://www.mandriva.com/en/support/security/ _______________________________________________________________________ Package : curl Date : March 28, 2015 Affected: Business Server 2.0 _______________________________________________________________________ Problem Description: Updated curl packages fix security vulnerabilities: Paras Sethia discovered that libcurl would sometimes mix up multiple HTTP and HTTPS connections with NTLM authentication to the same server, sending requests for one user over the connection authenticated as a different user (CVE-2014-0015). libcurl can in some circumstances re-use the wrong connection when asked to do transfers using other protocols than HTTP and FTP, causing a transfer that was initiated by an application to wrongfully re-use an existing connection to
[ MDVSA-2015:097 ] php-ZendFramework
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 _______________________________________________________________________ Mandriva Linux Security Advisory MDVSA-2015:097 http://www.mandriva.com/en/support/security/ _______________________________________________________________________ Package : php-ZendFramework Date : March 28, 2015 Affected: Business Server 2.0 _______________________________________________________________________ Problem Description: Updated php-ZendFramework packages fix multiple vulnerabilities: XML eXternal Entity (XXE) and XML Entity Expansion (XEE) flaws were discovered in the Zend Framework. An attacker could use these flaws to cause a denial of service, access files accessible to the server process, or possibly perform other more advanced XML External Entity (XXE) attacks (CVE-2014-2681, CVE-2014-2682, CVE-2014-2683). Using the Consumer component of Zend_OpenId, it is possible to login using an arbitrary OpenID account (without kno
[ MDVSA-2015:096 ] stunnel
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 _______________________________________________________________________ Mandriva Linux Security Advisory MDVSA-2015:096 http://www.mandriva.com/en/support/security/ _______________________________________________________________________ Package : stunnel Date : March 28, 2015 Affected: Business Server 2.0 _______________________________________________________________________ Problem Description: Updated stunnel package fixes security vulnerability: A flaw was found in the way stunnel, a socket wrapper which can provide SSL support to ordinary applications, performed (re)initialization of PRNG after fork. When accepting a new connection, the server forks and the child process handles the request. The RAND_bytes() function of openssl doesn't reset its state after the fork, but seeds the PRNG with the output of time(NULL). The most important consequence is that servers using EC (ECDSA) or DSA certificates may
[ MDVSA-2015:095 ] openssh
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 _______________________________________________________________________ Mandriva Linux Security Advisory MDVSA-2015:095 http://www.mandriva.com/en/support/security/ _______________________________________________________________________ Package : openssh Date : March 28, 2015 Affected: Business Server 2.0 _______________________________________________________________________ Problem Description: Updated openssh packages fix security vulnerabilities: sshd in OpenSSH before 6.6 does not properly support wildcards on AcceptEnv lines in sshd_config, which allows remote attackers to bypass intended environment restrictions by using a substring located before a wildcard character (CVE-2014-2532). Matthew Vernon reported that if a SSH server offers a HostCertificate that the ssh client doesn't accept, then the client doesn't check the DNS for SSHFP records. As a consequence a malicious server can disable S
[ MDVSA-2015:094 ] nginx
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 _______________________________________________________________________ Mandriva Linux Security Advisory MDVSA-2015:094 http://www.mandriva.com/en/support/security/ _______________________________________________________________________ Package : nginx Date : March 28, 2015 Affected: Business Server 2.0 _______________________________________________________________________ Problem Description: Updated nginx package fixes security vulnerabilities: A bug in the experimental SPDY implementation in nginx was found, which might allow an attacker to cause a heap memory buffer overflow in a worker process by using a specially crafted request, potentially resulting in arbitrary code execution (CVE-2014-0133). Antoine Delignat-Lavaud and Karthikeyan Bhargavan discovered that it was possible to reuse cached SSL sessions in unrelated contexts, allowing virtual host confusion attacks in some configurations by an attacker
[ MDVSA-2015:093 ] apache
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 _______________________________________________________________________ Mandriva Linux Security Advisory MDVSA-2015:093 http://www.mandriva.com/en/support/security/ _______________________________________________________________________ Package : apache Date : March 28, 2015 Affected: Business Server 2.0 _______________________________________________________________________ Problem Description: Updated apache packages fix security vulnerabilities: Apache HTTPD before 2.4.9 was vulnerable to a denial of service in mod_dav when handling DAV_WRITE requests (CVE-2013-6438). Apache HTTPD before 2.4.9 was vulnerable to a denial of service when logging cookies (CVE-2014-0098). A race condition flaw, leading to heap-based buffer overflows, was found in the mod_status httpd module. A remote attacker able to access a status page served by mod_status on a server using a threaded Multi-Processing Module (MPM) could sen
[ MDVSA-2015:092 ] net-snmp
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 _______________________________________________________________________ Mandriva Linux Security Advisory MDVSA-2015:092 http://www.mandriva.com/en/support/security/ _______________________________________________________________________ Package : net-snmp Date : March 28, 2015 Affected: Business Server 2.0 _______________________________________________________________________ Problem Description: Updated net-snmp packages fix security vulnerabilities: Remotely exploitable denial of service vulnerability in Net-SNMP, in the Linux implementation of the ICMP-MIB, making the SNMP agent vulnerable if it is making use of the ICMP-MIB table objects (CVE-2014-2284). Remotely exploitable denial of service vulnerability in Net-SNMP, in snmptrapd, due to how it handles trap requests with an empty community string when the perl handler is enabled (CVE-2014-2285). A remote denial-of-service flaw was found in the way snm
[ MDVSA-2015:091 ] mariadb
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 _______________________________________________________________________ Mandriva Linux Security Advisory MDVSA-2015:091 http://www.mandriva.com/en/support/security/ _______________________________________________________________________ Package : mariadb Date : March 28, 2015 Affected: Business Server 2.0 _______________________________________________________________________ Problem Description: This update provides MariaDB 5.5.42, which fixes several security issues and other bugs. Please refer to the Oracle Critical Patch Update Advisories and the Release Notes for MariaDB for further information regarding the security vulnerabilities. Additionally the jemalloc packages is being provided as it was previousely provided with the mariadb source code, built and used but removed from the mariadb source code since 5.5.40. _______________________________________________________________________ References: http://