-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 _______________________________________________________________________ Mandriva Linux Security Advisory MDVSA-2015:094 http://www.mandriva.com/en/support/security/ _______________________________________________________________________ Package : nginx Date : March 28, 2015 Affected: Business Server 2.0 _______________________________________________________________________ Problem Description: Updated nginx package fixes security vulnerabilities: A bug in the experimental SPDY implementation in nginx was found, which might allow an attacker to cause a heap memory buffer overflow in a worker process by using a specially crafted request, potentially resulting in arbitrary code execution (CVE-2014-0133). Antoine Delignat-Lavaud and Karthikeyan Bhargavan discovered that it was possible to reuse cached SSL sessions in unrelated contexts, allowing virtual host confusion attacks in some configurations by an attacker
Category Archives: Mandriva
Mandriva Security Advisory
[ MDVSA-2015:093 ] apache
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 _______________________________________________________________________ Mandriva Linux Security Advisory MDVSA-2015:093 http://www.mandriva.com/en/support/security/ _______________________________________________________________________ Package : apache Date : March 28, 2015 Affected: Business Server 2.0 _______________________________________________________________________ Problem Description: Updated apache packages fix security vulnerabilities: Apache HTTPD before 2.4.9 was vulnerable to a denial of service in mod_dav when handling DAV_WRITE requests (CVE-2013-6438). Apache HTTPD before 2.4.9 was vulnerable to a denial of service when logging cookies (CVE-2014-0098). A race condition flaw, leading to heap-based buffer overflows, was found in the mod_status httpd module. A remote attacker able to access a status page served by mod_status on a server using a threaded Multi-Processing Module (MPM) could sen
[ MDVSA-2015:092 ] net-snmp
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 _______________________________________________________________________ Mandriva Linux Security Advisory MDVSA-2015:092 http://www.mandriva.com/en/support/security/ _______________________________________________________________________ Package : net-snmp Date : March 28, 2015 Affected: Business Server 2.0 _______________________________________________________________________ Problem Description: Updated net-snmp packages fix security vulnerabilities: Remotely exploitable denial of service vulnerability in Net-SNMP, in the Linux implementation of the ICMP-MIB, making the SNMP agent vulnerable if it is making use of the ICMP-MIB table objects (CVE-2014-2284). Remotely exploitable denial of service vulnerability in Net-SNMP, in snmptrapd, due to how it handles trap requests with an empty community string when the perl handler is enabled (CVE-2014-2285). A remote denial-of-service flaw was found in the way snm
[ MDVSA-2015:091 ] mariadb
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 _______________________________________________________________________ Mandriva Linux Security Advisory MDVSA-2015:091 http://www.mandriva.com/en/support/security/ _______________________________________________________________________ Package : mariadb Date : March 28, 2015 Affected: Business Server 2.0 _______________________________________________________________________ Problem Description: This update provides MariaDB 5.5.42, which fixes several security issues and other bugs. Please refer to the Oracle Critical Patch Update Advisories and the Release Notes for MariaDB for further information regarding the security vulnerabilities. Additionally the jemalloc packages is being provided as it was previousely provided with the mariadb source code, built and used but removed from the mariadb source code since 5.5.40. _______________________________________________________________________ References: http://
[ MDVSA-2015:090 ] libpng
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 _______________________________________________________________________ Mandriva Linux Security Advisory MDVSA-2015:090 http://www.mandriva.com/en/support/security/ _______________________________________________________________________ Package : libpng Date : March 28, 2015 Affected: Business Server 2.0 _______________________________________________________________________ Problem Description: Updated libpng package fixes security vulnerabilities: The png_push_read_chunk function in pngpread.c in the progressive decoder in libpng 1.6.x through 1.6.9 allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via an IDAT chunk with a length of zero (CVE-2014-0333). libpng versions 1.6.9 through 1.6.15 have an integer-overflow vulnerability in png_combine_row() when decoding very wide interlaced images, which can allow an attacker to overwrite an arbitrary amount of memory with arb
[ MDVSA-2015:089 ] freetype2
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 _______________________________________________________________________ Mandriva Linux Security Advisory MDVSA-2015:089 http://www.mandriva.com/en/support/security/ _______________________________________________________________________ Package : freetype2 Date : March 28, 2015 Affected: Business Server 2.0 _______________________________________________________________________ Problem Description: Updated freetype2 packages fix security vulnerabilities: It was reported that Freetype before 2.5.3 suffers from an out-of-bounds stack-based read/write flaw in cf2_hintmap_build() in the CFF rasterizing code, which could lead to a buffer overflow (CVE-2014-2240). It was also reported that Freetype before 2.5.3 has a denial-of-service vulnerability in the CFF rasterizing code, due to a reachable assertion (CVE-2014-2241). It was reported that Freetype before 2.5.4 suffers from an out-of-bounds stack-based read/wr
[ MDVSA-2015:088 ] udisks2
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 _______________________________________________________________________ Mandriva Linux Security Advisory MDVSA-2015:088 http://www.mandriva.com/en/support/security/ _______________________________________________________________________ Package : udisks2 Date : March 28, 2015 Affected: Business Server 2.0 _______________________________________________________________________ Problem Description: Updated udisks2 packages fixes security vulnerability: A flaw was found in the way udisks and udisks2 handled long path names. A malicious, local user could use this flaw to create a specially-crafted directory structure that could lead to arbitrary code execution with the privileges of the udisks daemon (root) (CVE-2014-0004). _______________________________________________________________________ References: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0004 http://advisories.mageia.org/MGASA-2014-0129.htm
[ MDVSA-2015:087 ] egroupware
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 _______________________________________________________________________ Mandriva Linux Security Advisory MDVSA-2015:087 http://www.mandriva.com/en/support/security/ _______________________________________________________________________ Package : egroupware Date : March 28, 2015 Affected: Business Server 2.0 _______________________________________________________________________ Problem Description: Updated egroupware packages fix security vulnerabilities: eGroupware prior to 1.8.006.20140217 is vulnerable to remote file deletion and possible remote code execution due to user input being passed to PHP's unserialize() method (CVE-2014-2027). eGroupWare before 1.8.007 allows logged in users with administrative priviledges to remotely execute arbitrary commands on the server. It is also vulnerable to a cross site request forgery vulnerability that allows creating new administrative users. ___________________
[ MDVSA-2015:086 ] libssh
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 _______________________________________________________________________ Mandriva Linux Security Advisory MDVSA-2015:086 http://www.mandriva.com/en/support/security/ _______________________________________________________________________ Package : libssh Date : March 28, 2015 Affected: Business Server 2.0 _______________________________________________________________________ Problem Description: Updated libssh packages fix security vulnerabilities: When using libssh before 0.6.3, a libssh-based server, when accepting a new connection, forks and the child process handles the request. The RAND_bytes() function of openssl doesn't reset its state after the fork, but simply adds the current process id (getpid) to the PRNG state, which is not guaranteed to be unique. The most important consequence is that servers using EC (ECDSA) or DSA certificates may under certain conditions leak their private key (CVE-2014-001
[ MDVSA-2015:085 ] subversion
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 _______________________________________________________________________ Mandriva Linux Security Advisory MDVSA-2015:085 http://www.mandriva.com/en/support/security/ _______________________________________________________________________ Package : subversion Date : March 28, 2015 Affected: Business Server 2.0 _______________________________________________________________________ Problem Description: Updated subversion packages fix security vulnerabilities: The mod_dav_svn module in Apache Subversion before 1.8.8, when SVNListParentPath is enabled, allows remote attackers to cause a denial of service (crash) via an OPTIONS request (CVE-2014-0032). Ben Reser discovered that Subversion did not correctly validate SSL certificates containing wildcards. A remote attacker could exploit this to perform a man in the middle attack to view sensitive information or alter encrypted communications (CVE-2014-3522). Bert Hu