Category Archives: Mandriva

Mandriva Security Advisory

[ MDVSA-2015:094 ] nginx

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________

 Mandriva Linux Security Advisory                         MDVSA-2015:094
 http://www.mandriva.com/en/support/security/
 _______________________________________________________________________

 Package : nginx
 Date    : March 28, 2015
 Affected: Business Server 2.0
 _______________________________________________________________________

 Problem Description:

 Updated nginx package fixes security vulnerabilities:
 
 A bug in the experimental SPDY implementation in nginx was found,
 which might allow an attacker to cause a heap memory buffer overflow
 in a worker process by using a specially crafted request, potentially
 resulting in arbitrary code execution (CVE-2014-0133).
 
 Antoine Delignat-Lavaud and Karthikeyan Bhargavan discovered that
 it was possible to reuse cached SSL sessions in unrelated contexts,
 allowing virtual host confusion attacks in some configurations by an
 attacker

[ MDVSA-2015:093 ] apache

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________

 Mandriva Linux Security Advisory                         MDVSA-2015:093
 http://www.mandriva.com/en/support/security/
 _______________________________________________________________________

 Package : apache
 Date    : March 28, 2015
 Affected: Business Server 2.0
 _______________________________________________________________________

 Problem Description:

 Updated apache packages fix security vulnerabilities:
 
 Apache HTTPD before 2.4.9 was vulnerable to a denial of service in
 mod_dav when handling DAV_WRITE requests (CVE-2013-6438).
 
 Apache HTTPD before 2.4.9 was vulnerable to a denial of service when
 logging cookies (CVE-2014-0098).
 
 A race condition flaw, leading to heap-based buffer overflows,
 was found in the mod_status httpd module. A remote attacker able to
 access a status page served by mod_status on a server using a threaded
 Multi-Processing Module (MPM) could sen

[ MDVSA-2015:092 ] net-snmp

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________

 Mandriva Linux Security Advisory                         MDVSA-2015:092
 http://www.mandriva.com/en/support/security/
 _______________________________________________________________________

 Package : net-snmp
 Date    : March 28, 2015
 Affected: Business Server 2.0
 _______________________________________________________________________

 Problem Description:

 Updated net-snmp packages fix security vulnerabilities:
 
 Remotely exploitable denial of service vulnerability in Net-SNMP,
 in the Linux implementation of the ICMP-MIB, making the SNMP
 agent vulnerable if it is making use of the ICMP-MIB table objects
 (CVE-2014-2284).
 
 Remotely exploitable denial of service vulnerability in Net-SNMP,
 in snmptrapd, due to how it handles trap requests with an empty
 community string when the perl handler is enabled (CVE-2014-2285).
 
 A remote denial-of-service flaw was found in the way snm

[ MDVSA-2015:091 ] mariadb

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________

 Mandriva Linux Security Advisory                         MDVSA-2015:091
 http://www.mandriva.com/en/support/security/
 _______________________________________________________________________

 Package : mariadb
 Date    : March 28, 2015
 Affected: Business Server 2.0
 _______________________________________________________________________

 Problem Description:

 This update provides MariaDB 5.5.42, which fixes several security
 issues and other bugs. Please refer to the Oracle Critical Patch Update
 Advisories and the Release Notes for MariaDB for further information
 regarding the security vulnerabilities.
 
 Additionally the jemalloc packages is being provided as it was
 previousely provided with the mariadb source code, built and used
 but removed from the mariadb source code since 5.5.40.
 _______________________________________________________________________

 References:

 http://

[ MDVSA-2015:090 ] libpng

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________

 Mandriva Linux Security Advisory                         MDVSA-2015:090
 http://www.mandriva.com/en/support/security/
 _______________________________________________________________________

 Package : libpng
 Date    : March 28, 2015
 Affected: Business Server 2.0
 _______________________________________________________________________

 Problem Description:

 Updated libpng package fixes security vulnerabilities:
 
 The png_push_read_chunk function in pngpread.c in the progressive
 decoder in libpng 1.6.x through 1.6.9 allows remote attackers to cause
 a denial of service (infinite loop and CPU consumption) via an IDAT
 chunk with a length of zero (CVE-2014-0333).
 
 libpng versions 1.6.9 through 1.6.15 have an integer-overflow
 vulnerability in png_combine_row() when decoding very wide interlaced
 images, which can allow an attacker to overwrite an arbitrary amount
 of memory with arb

[ MDVSA-2015:089 ] freetype2

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________

 Mandriva Linux Security Advisory                         MDVSA-2015:089
 http://www.mandriva.com/en/support/security/
 _______________________________________________________________________

 Package : freetype2
 Date    : March 28, 2015
 Affected: Business Server 2.0
 _______________________________________________________________________

 Problem Description:

 Updated freetype2 packages fix security vulnerabilities:
 
 It was reported that Freetype before 2.5.3 suffers from an
 out-of-bounds stack-based read/write flaw in cf2_hintmap_build()
 in the CFF rasterizing code, which could lead to a buffer overflow
 (CVE-2014-2240).
 
 It was also reported that Freetype before 2.5.3 has a denial-of-service
 vulnerability in the CFF rasterizing code, due to a reachable assertion
 (CVE-2014-2241).
 
 It was reported that Freetype before 2.5.4 suffers from an
 out-of-bounds stack-based read/wr

[ MDVSA-2015:088 ] udisks2

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________

 Mandriva Linux Security Advisory                         MDVSA-2015:088
 http://www.mandriva.com/en/support/security/
 _______________________________________________________________________

 Package : udisks2
 Date    : March 28, 2015
 Affected: Business Server 2.0
 _______________________________________________________________________

 Problem Description:

 Updated udisks2 packages fixes security vulnerability:
 
 A flaw was found in the way udisks and udisks2 handled long path
 names. A malicious, local user could use this flaw to create a
 specially-crafted directory structure that could lead to arbitrary
 code execution with the privileges of the udisks daemon (root)
 (CVE-2014-0004).
 _______________________________________________________________________

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0004
 http://advisories.mageia.org/MGASA-2014-0129.htm

[ MDVSA-2015:087 ] egroupware

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________

 Mandriva Linux Security Advisory                         MDVSA-2015:087
 http://www.mandriva.com/en/support/security/
 _______________________________________________________________________

 Package : egroupware
 Date    : March 28, 2015
 Affected: Business Server 2.0
 _______________________________________________________________________

 Problem Description:

 Updated egroupware packages fix security vulnerabilities:
 
 eGroupware prior to 1.8.006.20140217 is vulnerable to remote file
 deletion and possible remote code execution due to user input being
 passed to PHP's unserialize() method (CVE-2014-2027).
 
 eGroupWare before 1.8.007 allows logged in users with administrative
 priviledges to remotely execute arbitrary commands on the server.
 It is also vulnerable to a cross site request forgery vulnerability
 that allows creating new administrative users.
 ___________________

[ MDVSA-2015:086 ] libssh

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________

 Mandriva Linux Security Advisory                         MDVSA-2015:086
 http://www.mandriva.com/en/support/security/
 _______________________________________________________________________

 Package : libssh
 Date    : March 28, 2015
 Affected: Business Server 2.0
 _______________________________________________________________________

 Problem Description:

 Updated libssh packages fix security vulnerabilities:
 
 When using libssh before 0.6.3, a libssh-based server, when accepting
 a new connection, forks and the child process handles the request. The
 RAND_bytes() function of openssl doesn't reset its state after the
 fork, but simply adds the current process id (getpid) to the PRNG
 state, which is not guaranteed to be unique. The most important
 consequence is that servers using EC (ECDSA) or DSA certificates may
 under certain conditions leak their private key (CVE-2014-001

[ MDVSA-2015:085 ] subversion

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________

 Mandriva Linux Security Advisory                         MDVSA-2015:085
 http://www.mandriva.com/en/support/security/
 _______________________________________________________________________

 Package : subversion
 Date    : March 28, 2015
 Affected: Business Server 2.0
 _______________________________________________________________________

 Problem Description:

 Updated subversion packages fix security vulnerabilities:
 
 The mod_dav_svn module in Apache Subversion before 1.8.8, when
 SVNListParentPath is enabled, allows remote attackers to cause a
 denial of service (crash) via an OPTIONS request (CVE-2014-0032).
 
 Ben Reser discovered that Subversion did not correctly validate SSL
 certificates containing wildcards. A remote attacker could exploit this
 to perform a man in the middle attack to view sensitive information
 or alter encrypted communications (CVE-2014-3522).
 
 Bert Hu