Category Archives: Mandriva

Mandriva Security Advisory

MDVSA-2014:206: ctags

Updated ctags package fixes security vulnerability:

A denial of service issue was discovered in ctags 5.8. A remote
attacker could cause excessive CPU usage and disk space consumption
via a crafted JavaScript file by triggering an infinite loop
(CVE-2014-7204).

MDVSA-2014:208: phpmyadmin

Updated phpmyadmin package fixes security vulnerability:

In phpMyAdmin before 4.2.10.1, with a crafted database or table name
it is possible to trigger an XSS in SQL debug output when enabled and
in server monitor page when viewing and analysing executed queries
(CVE-2014-8326).

MDVSA-2014:209: java-1.7.0-openjdk

Multiple vulnerabilities has been discovered and corrected in
java-1.7.0-openjdk:

Multiple flaws were discovered in the Libraries, 2D, and Hotspot
components in OpenJDK. An untrusted Java application or applet
could use these flaws to bypass certain Java sandbox restrictions
(CVE-2014-6506, CVE-2014-6531, CVE-2014-6502, CVE-2014-6511,
CVE-2014-6504, CVE-2014-6519).

It was discovered that the StAX XML parser in the JAXP component in
OpenJDK performed expansion of external parameter entities even when
external entity substitution was disabled. A remote attacker could
use this flaw to perform XML eXternal Entity (XXE) attack against
applications using the StAX parser to parse untrusted XML documents
(CVE-2014-6517).

It was discovered that the DatagramSocket implementation in OpenJDK
failed to perform source address checks for packets received on a
connected socket. A remote attacker could use this flaw to have their
packets processed as if they were received from the expected source
(CVE-2014-6512).

It was discovered that the TLS/SSL implementation in the JSSE component
in OpenJDK failed to properly verify the server identity during
the renegotiation following session resumption, making it possible
for malicious TLS/SSL servers to perform a Triple Handshake attack
against clients using JSSE and client certificate authentication
(CVE-2014-6457).

It was discovered that the CipherInputStream class implementation
in OpenJDK did not properly handle certain exceptions. This could
possibly allow an attacker to affect the integrity of an encrypted
stream handled by this class (CVE-2014-6558).

The updated packages provides a solution for these security issues.

[ MDVSA-2014:209 ] java-1.7.0-openjdk

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________

 Mandriva Linux Security Advisory                         MDVSA-2014:209
 http://www.mandriva.com/en/support/security/
 _______________________________________________________________________

 Package : java-1.7.0-openjdk
 Date    : October 24, 2014
 Affected: Business Server 1.0
 _______________________________________________________________________

 Problem Description:

 Multiple vulnerabilities has been discovered and corrected in
 java-1.7.0-openjdk:
 
 Multiple flaws were discovered in the Libraries, 2D, and Hotspot
 components in OpenJDK. An untrusted Java application or applet
 could use these flaws to bypass certain Java sandbox restrictions
 (CVE-2014-6506, CVE-2014-6531, CVE-2014-6502, CVE-2014-6511,
 CVE-2014-6504, CVE-2014-6519).
 
 It was discovered that the StAX XML parser in the JAXP component in
 OpenJDK performed expansion of external parameter entities even when
 exte

[ MDVSA-2014:208 ] phpmyadmin

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________

 Mandriva Linux Security Advisory                         MDVSA-2014:208
 http://www.mandriva.com/en/support/security/
 _______________________________________________________________________

 Package : phpmyadmin
 Date    : October 24, 2014
 Affected: Business Server 1.0
 _______________________________________________________________________

 Problem Description:

 Updated phpmyadmin package fixes security vulnerability:
 
 In phpMyAdmin before 4.2.10.1, with a crafted database or table name
 it is possible to trigger an XSS in SQL debug output when enabled and
 in server monitor page when viewing and analysing executed queries
 (CVE-2014-8326).
 _______________________________________________________________________

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8326
 http://advisories.mageia.org/MGASA-2014-0420.html
 ___________________________________________

[ MDVSA-2014:207 ] ejabberd

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________

 Mandriva Linux Security Advisory                         MDVSA-2014:207
 http://www.mandriva.com/en/support/security/
 _______________________________________________________________________

 Package : ejabberd
 Date    : October 24, 2014
 Affected: Business Server 1.0
 _______________________________________________________________________

 Problem Description:

 Updated ejabberd packages fix security vulnerability:
 
 A flaw was discovered in ejabberd that allows clients to connect
 with an unencrypted connection even if starttls_required is set
 (CVE-2014-8760).
 _______________________________________________________________________

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8760
 http://advisories.mageia.org/MGASA-2014-0417.html
 _______________________________________________________________________

 Updated Packages:

 Mandriva Business Server 1/X86_6

[ MDVSA-2014:206 ] ctags

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________

 Mandriva Linux Security Advisory                         MDVSA-2014:206
 http://www.mandriva.com/en/support/security/
 _______________________________________________________________________

 Package : ctags
 Date    : October 24, 2014
 Affected: Business Server 1.0
 _______________________________________________________________________

 Problem Description:

 Updated ctags package fixes security vulnerability:
 
 A denial of service issue was discovered in ctags 5.8. A remote
 attacker could cause excessive CPU usage and disk space consumption
 via a crafted JavaScript file by triggering an infinite loop
 (CVE-2014-7204).
 _______________________________________________________________________

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7204
 http://advisories.mageia.org/MGASA-2014-0415.html
 __________________________________________________________________

[ MDVSA-2014:205 ] lua

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

 _______________________________________________________________________

 Mandriva Linux Security Advisory                         MDVSA-2014:205
 http://www.mandriva.com/en/support/security/
 _______________________________________________________________________

 Package : lua
 Date    : October 24, 2014
 Affected: Business Server 1.0
 _______________________________________________________________________

 Problem Description:

 Updated lua and lua5.1 packages fix security vulnerability:
 
 A heap-based overflow vulnerability was found in the way Lua handles
 varargs functions with many fixed parameters called with few arguments,
 leading to application crashes or, potentially, arbitrary code
 execution (CVE-2014-5461).
 _______________________________________________________________________

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5461
 http://advisories.mageia.org/MGASA-2014-0414.html
 _______________________________________

MDVSA-2014:203: openssl

Multiple vulnerabilities has been discovered and corrected in openssl:

OpenSSL has added support for TLS_FALLBACK_SCSV to allow applications
to block the ability for a MITM attacker to force a protocol
downgrade. Some client applications (such as browsers) will reconnect
using a downgraded protocol to work around interoperability bugs in
older servers. This could be exploited by an active man-in-the-middle
to downgrade connections to SSL 3.0 even if both sides of the
connection support higher protocols. SSL 3.0 contains a number of
weaknesses including POODLE (CVE-2014-3566).

When an OpenSSL SSL/TLS/DTLS server receives a session ticket the
integrity of that ticket is first verified. In the event of a session
ticket integrity check failing, OpenSSL will fail to free memory
causing a memory leak. By sending a large number of invalid session
tickets an attacker could exploit this issue in a Denial Of Service
attack (CVE-2014-3567).

The updated packages have been upgraded to the 1.0.0o version where
these security flaws has been fixed.