-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 _______________________________________________________________________ Mandriva Linux Security Advisory MDVSA-2015:217 http://www.mandriva.com/en/support/security/ _______________________________________________________________________ Package : sqlite3 Date : April 30, 2015 Affected: Business Server 1.0, Business Server 2.0 _______________________________________________________________________ Problem Description: Multiple vulnerabilities has been found and corrected in sqlite3: SQLite before 3.8.9 does not properly implement the dequoting of collation-sequence names, which allows context-dependent attackers to cause a denial of service (uninitialized memory access and application crash) or possibly have unspecified other impact via a crafted COLLATE clause, as demonstrated by COLLATE at the end of a SELECT statement (CVE-2015-3414). The sqlite3VdbeExec function in vdbe.c in SQLite before 3.8.9 does not pro
Monthly Archives: April 2015
TestDisk 6.14 Check_OS2MB Stack Buffer Overflow
Posted by Denis Andzakovic on Apr 30
( , ) (,
. ‘.’ ) (‘. ‘,
). , (‘. ( ) (
(_,) .’), ) _ _,
/ _____/ / _ ____ ____ _____
____ ==/ /_ _/ ___/ _ /
/ / | \ __( <_> ) Y Y
/______ /___|__ / ___ >____/|__|_| /
/ /.-. / /:wq
(x.0)
‘=.|w|.=’
_=”””=….
Fedora 20 Security Update: perl-XML-LibXML-2.0119-1.fc20
Fedora 20 Security Update: libarchive-3.1.2-8.fc20
Fedora 21 Security Update: 389-ds-base-1.3.3.10-1.fc21
Resolved Bugs
1216203 – CVE-2015-1854 389-ds-base: access control bypass with modrdn [fedora-all]<br
release 1.3.3.10 with a fix for CVE-2015-1854
Fedora 21 Security Update: libarchive-3.1.2-11.fc21
Fedora 20 Security Update: libreoffice-4.2.8.2-8.fc20
Fedora 22 Security Update: 389-ds-base-1.3.3.10-1.fc22
Resolved Bugs
1216203 – CVE-2015-1854 389-ds-base: access control bypass with modrdn [fedora-all]<br
release 1.3.3.10 with a fix for CVE-2015-1854
Fedora 22 Security Update: libarchive-3.1.2-12.fc22
Google Releases Security Update for Chrome
Original release date: April 29, 2015
Google has released Chrome version 42.0.2311.135 for Windows, Mac, and Linux to address multiple vulnerabilities. Exploitation of one of these vulnerabilities may allow a remote attacker to take control of an affected system.
US-CERT encourages users and administrators to review the Google Chrome blog entry and apply the necessary updates.
This product is provided subject to this Notification and this Privacy & Use policy.