-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 _______________________________________________________________________ Mandriva Linux Security Advisory MDVSA-2015:192 http://www.mandriva.com/en/support/security/ _______________________________________________________________________ Package : subversion Date : April 3, 2015 Affected: Business Server 1.0, Business Server 2.0 _______________________________________________________________________ Problem Description: Multiple vulnerabilities has been discovered and corrected in subversion: Subversion HTTP servers with FSFS repositories are vulnerable to a remotely triggerable excessive memory use with certain REPORT requests (CVE-2015-0202). Subversion mod_dav_svn and svnserve are vulnerable to a remotely triggerable assertion DoS vulnerability for certain requests with dynamically evaluated revision numbers (CVE-2015-0248). Subversion HTTP servers allow spoofing svn:author property values for new revisio
Category Archives: Mandriva
Mandriva Security Advisory
[ MDVA-2015:006 ] nss
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 _______________________________________________________________________ Mandriva Linux Advisory MDVA-2015:006 http://www.mandriva.com/en/support/security/ _______________________________________________________________________ Package : nss Date : April 3, 2015 Affected: Business Server 2.0 _______________________________________________________________________ Problem Description: This is a maintenance and bugfix release that upgrades NSS to the latest 3.18 version which resolves various upstream bugs. Additionally the rootcerts package has also been updated to the latest version as of 2015-03-26, which adds, removes, and distrusts several certificates. _______________________________________________________________________ References: https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.18_release_notes _______________________________________________________________________ Updated
[ MDVA-2015:005 ] nss
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 _______________________________________________________________________ Mandriva Linux Advisory MDVA-2015:005 http://www.mandriva.com/en/support/security/ _______________________________________________________________________ Package : nss Date : April 3, 2015 Affected: Business Server 1.0 _______________________________________________________________________ Problem Description: This is a maintenance and bugfix release that upgrades NSS to the latest 3.18 version and NSPR to the latest 4.10.8 version which resolves various upstream bugs. Additionally the rootcerts package has also been updated to the latest version as of 2015-03-26, which adds, removes, and distrusts several certificates. _______________________________________________________________________ References: https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.17.4_release_notes https://developer.mozilla.org/en-US/docs
MDVSA-2015:191: owncloud
Multiple vulnerabilities has been discovered and corrected in owncloud:
* Multiple stored XSS in contacts application (oC-SA-2015-001)
* Multiple stored XSS in documents application (oC-SA-2015-002)
* Bypass of file blacklist (oC-SA-2015-004)
The updated packages have been upgraded to the 7.0.5 version where
these security flaws has been fixed.
MDVSA-2015:190: owncloud
Multiple vulnerabilities has been discovered and corrected in owncloud:
* Login bypass when using user_ldap due to unauthenticated binds
(oC-SA-2014-020)
* Login bypass when using the external FTP user backend
(oC-SA-2014-022)
* CSRF in bookmarks application (oC-SA-2014-027)
* Stored XSS in bookmarks application (oC-SA-2014-028)
* Multiple stored XSS in contacts application (oC-SA-2015-001)
* Multiple stored XSS in documents application (oC-SA-2015-002)
* Bypass of file blacklist (oC-SA-2015-004)
The updated packages have been upgraded to the 5.0.19 version where
these security flaws has been fixed.
MDVSA-2015:188: flac
Multiple vulnerabilities has been discovered and corrected in flac:
Heap-based buffer overflow in stream_decoder.c in libFLAC before 1.3.1
allows remote attackers to execute arbitrary code via a crafted .flac
file (CVE-2014-9028).
Stack-based buffer overflow in stream_decoder.c in libFLAC before
1.3.1 allows remote attackers to execute arbitrary code via a crafted
.flac file (CVE-2014-8962).
The updated packages provides a solution for these security issues.
MDVSA-2015:189: tor
Updated tor packages fix security vulnerabilities:
The tor package has been updated to version 0.2.4.26, which fixes
possible crashes that may be remotely trigger-able, which would
result in a denial of service, and also fixes a few other bugs.
See the release announcement for details.
MDVA-2015:004: openldap
The slapd service is stopped during the package upgrade to perform
upgrade on the OpenLDAP DB. The service wasn’t restarted after the
upgrade if the service was running before. This update fixes this
issue.
MDVSA-2015:161-1: icu
Updated icu packages fix security vulnerabilities:
The Regular Expressions package in International Components for Unicode
(ICU) 52 before SVN revision 292944 allows remote attackers to cause
a denial of service (memory corruption) or possibly have unspecified
other impact via vectors related to a zero-length quantifier or
look-behind expression (CVE-2014-7923, CVE-2014-7926).
The collator implementation in i18n/ucol.cpp in International
Components for Unicode (ICU) 52 through SVN revision 293126 does not
initialize memory for a data structure, which allows remote attackers
to cause a denial of service or possibly have unspecified other impact
via a crafted character sequence (CVE-2014-7940).
It was discovered that ICU incorrectly handled memory operations
when processing fonts. If an application using ICU processed crafted
data, an attacker could cause it to crash or potentially execute
arbitrary code with the privileges of the user invoking the program
(CVE-2014-6585, CVE-2014-6591).
Update:
Packages for Mandriva Business Server 1 are now being provided.
MDVSA-2015:187: graphviz
Updated graphviz packages fix security vulnerability:
Format string vulnerability in the yyerror function in
lib/cgraph/scan.l in Graphviz allows remote attackers to have
unspecified impact via format string specifiers in unknown vector,
which are not properly handled in an error string (CVE-2014-9157).
Additionally the gtkglarea2 and gtkglext packages were missing and
was required for graphviz to build, these packages are also being
provided with this advisory.