<?xml version="1.0"?>
<rss version="2.0"><channel><title>Mandriva Security Advisories Latest Topics</title><link>https://mandrivausers.org/index.php?/forum/33-mandriva-security-advisories/</link><description>Mandriva Security Advisories Latest Topics</description><language>en</language><item><title>Advisories  MDVSA-2011:011: opensc</title><link>https://mandrivausers.org/index.php?/topic/107505-advisories-mdvsa-2011011-opensc/</link><description><![CDATA[
<p>A vulnerability has been found and corrected in opensc:</p>
<p> </p>
<p> Multiple stack-based buffer overflows in libopensc in OpenSC 0.11.13</p>
<p> and earlier allow physically proximate attackers to execute arbitrary</p>
<p> code via a long serial-number field on a smart card, related to</p>
<p> (1) card-acos5.c, (2) card-atrust-acos.c, and (3) card-starcos.c</p>
<p> (CVE-2010-4523).</p>
<p> </p>
<p> Packages for 2009.0 are provided as of the Extended Maintenance</p>
<p> Program. Please visit this link to learn more:</p>
<p> <a href="http://store.mandriva.com/product_info.php?cPath=149&amp;products_id=490" rel="external nofollow">http://store.mandriva.com/product_info.php?cPath=149&amp;products_id=490</a></p>
<p> </p>
<p> The updated packages have been patched to correct this issue.</p>
]]></description><guid isPermaLink="false">107505</guid><pubDate>Sat, 15 Jan 2011 23:16:37 +0000</pubDate></item><item><title>Advisories  MDVSA-2011:010: xfig</title><link>https://mandrivausers.org/index.php?/topic/107487-advisories-mdvsa-2011010-xfig/</link><description><![CDATA[
<p>Multiple vulnerabilities has been found and corrected in xfig:</p>
<p> </p>
<p> Stack-based buffer overflow in the read_1_3_textobject function in</p>
<p> f_readold.c in Xfig 3.2.5b and earlier, and in the read_textobject</p>
<p> function in read1_3.c in fig2dev in Transfig 3.2.5a and earlier,</p>
<p> allows remote attackers to execute arbitrary code via a long string</p>
<p> in a malformed .fig file that uses the 1.3 file format.  NOTE:</p>
<p> some of these details are obtained from third party information</p>
<p> (CVE-2009-4227).</p>
<p> </p>
<p> Stack consumption vulnerability in u_bound.c in Xfig 3.2.5b and earlier</p>
<p> allows remote attackers to cause a denial of service (application</p>
<p> crash) via a long string in a malformed .fig file that uses the 1.3</p>
<p> file format, possibly related to the readfp_fig function in f_read.c</p>
<p> (CVE-2009-4228).</p>
<p> </p>
<p> Stack-based buffer overflow in Xfig 3.2.4 and 3.2.5 allows remote</p>
<p> attackers to cause a denial of service (crash) and possibly execute</p>
<p> arbitrary code via a FIG image with a crafted color definition</p>
<p> (CVE-2010-4262).</p>
<p> </p>
<p> Packages for 2009.0 are provided as of the Extended Maintenance</p>
<p> Program. Please visit this link to learn more:</p>
<p> <a href="http://store.mandriva.com/product_info.php?cPath=149&amp;products_id=490" rel="external nofollow">http://store.mandriva.com/product_info.php?cPath=149&amp;products_id=490</a></p>
<p> </p>
<p> The updated packages have been patched to correct these issues.</p>
]]></description><guid isPermaLink="false">107487</guid><pubDate>Sat, 15 Jan 2011 20:14:40 +0000</pubDate></item><item><title>Advisories  MDVSA-2011:009: gif2png</title><link>https://mandrivausers.org/index.php?/topic/107445-advisories-mdvsa-2011009-gif2png/</link><description><![CDATA[
<p>A vulnerability has been found and corrected in gif2png:</p>
<p> </p>
<p> Stack-based buffer overflow in gif2png.c in gif2png 2.5.3 and earlier</p>
<p> might allow context-dependent attackers to execute arbitrary code</p>
<p> via a long command-line argument, as demonstrated by a CGI program</p>
<p> that launches gif2png (CVE-2009-5018).</p>
<p> </p>
<p> Buffer overflow in gif2png.c in gif2png 2.5.3 and earlier might allow</p>
<p> context-dependent attackers to cause a denial of service (application</p>
<p> crash) or have unspecified other impact via a GIF file that contains</p>
<p> many images, leading to long extensions such as .p100 for PNG output</p>
<p> files, as demonstrated by a CGI program that launches gif2png,</p>
<p> a different vulnerability than CVE-2009-5018 (CVE-2010-4694).</p>
<p> </p>
<p> Packages for 2009.0 are provided as of the Extended Maintenance</p>
<p> Program. Please visit this link to learn more:</p>
<p> <a href="http://store.mandriva.com/product_info.php?cPath=149&amp;products_id=490" rel="external nofollow">http://store.mandriva.com/product_info.php?cPath=149&amp;products_id=490</a></p>
<p> </p>
<p> The updated packages have been patched to correct this issue.</p>
]]></description><guid isPermaLink="false">107445</guid><pubDate>Fri, 14 Jan 2011 18:37:38 +0000</pubDate></item><item><title>Advisories  MDVSA-2011:008: perl-CGI</title><link>https://mandrivausers.org/index.php?/topic/107439-advisories-mdvsa-2011008-perl-cgi/</link><description><![CDATA[
<p>A vulnerability has been found and corrected in perl-CGI:</p>
<p> </p>
<p> Unspecified vulnerability in CGI.pm 3.50 and earlier allows remote</p>
<p> attackers to inject arbitrary HTTP headers and conduct HTTP response</p>
<p> splitting attacks via unknown vectors.  NOTE: this issue exists</p>
<p> because of an incomplete fix for CVE-2010-2761 (CVE-2010-4411).</p>
<p> </p>
<p> Packages for 2009.0 are provided as of the Extended Maintenance</p>
<p> Program. Please visit this link to learn more:</p>
<p> <a href="http://store.mandriva.com/product_info.php?cPath=149&amp;products_id=490" rel="external nofollow">http://store.mandriva.com/product_info.php?cPath=149&amp;products_id=490</a></p>
<p> </p>
<p> The updated packages have been upgraded to the latest version (3.51)</p>
<p> which is not affected by this issue and in turn also brings many</p>
<p> bugfixes.</p>
]]></description><guid isPermaLink="false">107439</guid><pubDate>Fri, 14 Jan 2011 17:36:44 +0000</pubDate></item><item><title>Advisories  MDVSA-2011:007: wireshark</title><link>https://mandrivausers.org/index.php?/topic/107433-advisories-mdvsa-2011007-wireshark/</link><description><![CDATA[
<p>A vulnerability has been found and corrected in wireshark:</p>
<p> </p>
<p> Buffer overflow in the MAC-LTE dissector</p>
<p> (epan/dissectors/packet-mac-lte.c) in Wireshark 1.2.0 through 1.2.13</p>
<p> and 1.4.0 through 1.4.2 allows remote attackers to cause a denial</p>
<p> of service (crash) and possibly execute arbitrary code via a large</p>
<p> number of RARs (CVE-2011-0444).</p>
<p> </p>
<p> The updated packages have been upgraded to the latest version (1.2.14)</p>
<p> which is not affected by this issue.</p>
]]></description><guid isPermaLink="false">107433</guid><pubDate>Fri, 14 Jan 2011 13:33:08 +0000</pubDate></item><item><title>Advisories  MDVSA-2011:006: subversion</title><link>https://mandrivausers.org/index.php?/topic/107427-advisories-mdvsa-2011006-subversion/</link><description><![CDATA[
<p>Multiple vulnerabilities has been found and corrected in subversion:</p>
<p> </p>
<p> The walk function in repos.c in the mod_dav_svn module for the Apache</p>
<p> HTTP Server, as distributed in Apache Subversion before 1.6.15,</p>
<p> allows remote authenticated users to cause a denial of service (NULL</p>
<p> pointer dereference and daemon crash) via vectors that trigger the</p>
<p> walking of SVNParentPath collections (CVE-2010-4539).</p>
<p> </p>
<p> Multiple memory leaks in rev_hunt.c in Apache Subversion before 1.6.15</p>
<p> allow remote authenticated users to cause a denial of service (memory</p>
<p> consumption and daemon crash) via the -g option to the blame command</p>
<p> (CVE-2010-4644).</p>
<p> </p>
<p> Packages for 2009.0 are provided as of the Extended Maintenance</p>
<p> Program. Please visit this link to learn more:</p>
<p> <a href="http://store.mandriva.com/product_info.php?cPath=149&amp;products_id=490" rel="external nofollow">http://store.mandriva.com/product_info.php?cPath=149&amp;products_id=490</a></p>
<p> </p>
<p> The updated packages have been upgraded to the latest versions (1.5.9,</p>
<p> 1.6.15) which is not affected by these issues and in turn contains</p>
<p> many bugfixes as well.</p>
]]></description><guid isPermaLink="false">107427</guid><pubDate>Fri, 14 Jan 2011 11:31:53 +0000</pubDate></item><item><title>Advisories  MDVA-2011:001: openoffice.org-voikko</title><link>https://mandrivausers.org/index.php?/topic/107421-advisories-mdva-2011001-openofficeorg-voikko/</link><description><![CDATA[
<p>The previous advisory MDVA-2011:000 updated openoffice.org to 3.2.1</p>
<p> but didn't include a rebuilt openoffice.org-voikko, thus preventing</p>
<p> installation of the update when the openoffice.org Finnish language</p>
<p> package is installed.</p>
<p> </p>
<p> This advisory fixes the issue by providing the missing packages.</p>
]]></description><guid isPermaLink="false">107421</guid><pubDate>Thu, 13 Jan 2011 14:42:19 +0000</pubDate></item><item><title>Advisories  MDVSA-2011:005: evince</title><link>https://mandrivausers.org/index.php?/topic/107415-advisories-mdvsa-2011005-evince/</link><description><![CDATA[
<p>Multiple vulnerabilities has been found and corrected in evince:</p>
<p> </p>
<p> Array index error in the PK and VF font parser in the dvi-backend</p>
<p> component in Evince 2.32 and earlier allows remote attackers to</p>
<p> cause a denial of service (application crash) or possibly execute</p>
<p> arbitrary code via a crafted font in conjunction with a DVI file that</p>
<p> is processed by the thumbnailer (CVE-2010-2640, CVE-2010-2641).</p>
<p> </p>
<p> Heap-based buffer overflow in the AFM font parser in the dvi-backend</p>
<p> component in Evince 2.32 and earlier allows remote attackers to</p>
<p> cause a denial of service (application crash) or possibly execute</p>
<p> arbitrary code via a crafted font in conjunction with a DVI file that</p>
<p> is processed by the thumbnailer (CVE-2010-2642).</p>
<p> </p>
<p> Integer overflow in the TFM font parser in the dvi-backend component in</p>
<p> Evince 2.32 and earlier allows remote attackers to execute arbitrary</p>
<p> code via a crafted font in conjunction with a DVI file that is</p>
<p> processed by the thumbnailer (CVE-2010-2643).</p>
<p> </p>
<p> The updated packages have been patched to correct these issues.</p>
]]></description><guid isPermaLink="false">107415</guid><pubDate>Thu, 13 Jan 2011 13:42:42 +0000</pubDate></item><item><title>Advisories  MDVSA-2011:004: php-phar</title><link>https://mandrivausers.org/index.php?/topic/107397-advisories-mdvsa-2011004-php-phar/</link><description><![CDATA[
<p>A vulnerability has been found and corrected in php-phar:</p>
<p> </p>
<p> Multiple format string vulnerabilities in the phar extension in PHP</p>
<p> 5.3 before 5.3.2 allow context-dependent attackers to obtain sensitive</p>
<p> information (memory contents) and possibly execute arbitrary code</p>
<p> via a crafted phar:// URI that is not properly handled by the (1)</p>
<p> phar_stream_flush, (2) phar_wrapper_unlink, (3) phar_parse_url, or</p>
<p> (4) phar_wrapper_open_url functions in ext/phar/stream.c; and the (5)</p>
<p> phar_wrapper_open_dir function in ext/phar/dirstream.c, which triggers</p>
<p> errors in the php_stream_wrapper_log_error function (CVE-2010-2094).</p>
<p> </p>
<p> The updated packages have been upgraded to the latest version (2.0.0)</p>
<p> and patched to correct this issue.</p>
]]></description><guid isPermaLink="false">107397</guid><pubDate>Mon, 10 Jan 2011 23:32:17 +0000</pubDate></item><item><title>Advisories  MDVSA-2011:003: MHonArc</title><link>https://mandrivausers.org/index.php?/topic/107379-advisories-mdvsa-2011003-mhonarc/</link><description><![CDATA[
<p>Multiple vulnerabilities has been found and corrected in MHonArc:</p>
<p> </p>
<p> MHonArc 2.6.16 allows remote attackers to cause a denial of service</p>
<p> (CPU consumption) via start tags that are placed within other start</p>
<p> tags, as demonstrated by a &lt;bo&lt;bo&lt;bo&lt;bo&lt;body&gt;dy&gt;dy&gt;dy&gt;dy&gt; sequence,</p>
<p> a different vulnerability than CVE-2010-4524 (CVE-2010-1677).</p>
<p> </p>
<p> Cross-site scripting (XSS) vulnerability in lib/mhtxthtml.pl in</p>
<p> MHonArc 2.6.16 allows remote attackers to inject arbitrary web script</p>
<p> or HTML via a malformed start tag and end tag for a SCRIPT element,</p>
<p> as demonstrated by &lt;scr&lt;body&gt;ipt&gt; and &lt;/scr&lt;body&gt;ipt&gt; sequences</p>
<p> (CVE-2010-4524).</p>
<p> </p>
<p> Packages for 2009.0 are provided as of the Extended Maintenance</p>
<p> Program. Please visit this link to learn more:</p>
<p> <a href="http://store.mandriva.com/product_info.php?cPath=149&amp;products_id=490" rel="external nofollow">http://store.mandriva.com/product_info.php?cPath=149&amp;products_id=490</a></p>
<p> </p>
<p> The updated packages have been upgraded to the latest version (2.6.18)</p>
<p> which is not vulnerable to these issues.</p>
]]></description><guid isPermaLink="false">107379</guid><pubDate>Mon, 10 Jan 2011 13:59:14 +0000</pubDate></item><item><title>Advisories  MDVSA-2011:002: wireshark</title><link>https://mandrivausers.org/index.php?/topic/107367-advisories-mdvsa-2011002-wireshark/</link><description><![CDATA[
<p>A vulnerability has been found and corrected in wireshark:</p>
<p> </p>
<p> Buffer overflow in epan/dissectors/packet-enttec.c in Wireshark 1.4.2</p>
<p> allows remote attackers to cause a denial of service (application</p>
<p> crash) or possibly execute arbitrary code via a crafted ENTTEC DMX</p>
<p> packet with Run Length Encoding (RLE) compression (CVE-2010-4538).</p>
<p> </p>
<p> The updated packages have been patched to correct this issue.</p>
]]></description><guid isPermaLink="false">107367</guid><pubDate>Sun, 09 Jan 2011 14:35:50 +0000</pubDate></item><item><title>Advisories  MDVSA-2010:259: pidgin</title><link>https://mandrivausers.org/index.php?/topic/107361-advisories-mdvsa-2010259-pidgin/</link><description><![CDATA[
<p>A null pointer dereference due to receiving a short packet for a direct</p>
<p> connection in the MSN code could potentially cause a denial of service.</p>
<p> </p>
<p> Packages for 2009.0 are provided as of the Extended Maintenance</p>
<p> Program. Please visit this link to learn more:</p>
<p> <a href="http://store.mandriva.com/product_info.php?cPath=149&amp;products_id=490" rel="external nofollow">http://store.mandriva.com/product_info.php?cPath=149&amp;products_id=490</a></p>
<p> </p>
<p> This update provides pidgin 2.7.8 that has been patched to address</p>
<p> this flaw.</p>
]]></description><guid isPermaLink="false">107361</guid><pubDate>Sat, 08 Jan 2011 14:29:29 +0000</pubDate></item><item><title>Advisories  MDVSA-2011:001: dhcp</title><link>https://mandrivausers.org/index.php?/topic/107355-advisories-mdvsa-2011001-dhcp/</link><description><![CDATA[
<p>A vulnerability has been found and corrected in dhcp:</p>
<p> </p>
<p> ISC DHCP server 4.2 before 4.2.0-P2, when configured to use failover</p>
<p> partnerships, allows remote attackers to cause a denial of service</p>
<p> (communications-interrupted state and DHCP client service loss)</p>
<p> by connecting to a port that is only intended for a failover peer,</p>
<p> as demonstrated by a Nagios check_tcp process check to TCP port 520</p>
<p> (CVE-2010-3616).</p>
<p> </p>
<p> The updated packages have been patched to correct this issue.</p>
]]></description><guid isPermaLink="false">107355</guid><pubDate>Fri, 07 Jan 2011 14:22:49 +0000</pubDate></item><item><title>Advisories  MDVSA-2011:000: phpmyadmin</title><link>https://mandrivausers.org/index.php?/topic/107307-advisories-mdvsa-2011000-phpmyadmin/</link><description><![CDATA[
<p>Multiple vulnerabilities has been found and corrected in phpmyadmin:</p>
<p> </p>
<p> error.php in PhpMyAdmin 3.3.8.1 and earlier allows remote attackers</p>
<p> to conduct cross-site scripting (XSS) attacks via a crafted BBcode</p>
<p> tag containing @ characters, as demonstrated using [a@url@page]</p>
<p> (CVE-2010-4480).</p>
<p> </p>
<p> phpMyAdmin before 3.4.0-beta1 allows remote attackers to bypass</p>
<p> authentication and obtain sensitive information via a direct request</p>
<p> to phpinfo.php, which calls the phpinfo function (CVE-2010-4481).</p>
<p> </p>
<p> This upgrade provides the latest phpmyadmin version for MES5 (3.3.9)</p>
<p> and patches the version for CS4 to address these vulnerabilities.</p>
]]></description><guid isPermaLink="false">107307</guid><pubDate>Wed, 05 Jan 2011 14:13:03 +0000</pubDate></item><item><title>Advisories  MDVA-2011:000: openoffice.org</title><link>https://mandrivausers.org/index.php?/topic/107289-advisories-mdva-2011000-openofficeorg/</link><description><![CDATA[
<p>This is a bugfix and maintenance advisory that upgrades OpenOffice.org</p>
<p> to the 3.2.1 version. Additionally a couple of Mandriva reported bugs</p>
<p> has been fixed as described as follows:</p>
<p> </p>
<p> Openoffice.org status bar items got hidden whenever using</p>
<p> openoffice.org-kde4 package integration.</p>
<p> </p>
<p> Viewing OpenOffice.org documents inside Firefox under 64bits 2010.1</p>
<p> version was not possible.</p>
<p> </p>
<p> Additionally OpenOffice.org 3.2.1 requires saxon9 that is also provided</p>
<p> with this advisory.</p>
]]></description><guid isPermaLink="false">107289</guid><pubDate>Tue, 04 Jan 2011 13:21:02 +0000</pubDate></item><item><title>Advisories  MDVA-2010:242: xulrunner</title><link>https://mandrivausers.org/index.php?/topic/107259-advisories-mdva-2010242-xulrunner/</link><description><![CDATA[
<p>A bug in the integration with CUPS causes programs that rely on</p>
<p> xulrunner(Firefox, Thunderbird) to crash when trying to print (#61009).</p>
<p> </p>
<p> Packages for 2009.0 are provided as of the Extended Maintenance</p>
<p> Program. Please visit this link to learn more:</p>
<p> <a href="http://store.mandriva.com/product_info.php?cPath=149&amp;products_id=490" rel="external nofollow">http://store.mandriva.com/product_info.php?cPath=149&amp;products_id=490</a></p>
]]></description><guid isPermaLink="false">107259</guid><pubDate>Thu, 30 Dec 2010 16:28:17 +0000</pubDate></item><item><title>Advisories  MDVSA-2010:260: libxml2</title><link>https://mandrivausers.org/index.php?/topic/107253-advisories-mdvsa-2010260-libxml2/</link><description><![CDATA[
<p>A vulnerability was discovered and corrected in libxml2:</p>
<p> </p>
<p> A double free vulnerability in libxml2 (xpath.c) allows remote</p>
<p> attackers to cause a denial of service or possibly have unspecified</p>
<p> other impact via vectors related to XPath handling (CVE-2010-4494).</p>
<p> </p>
<p> Packages for 2009.0 are provided as of the Extended Maintenance</p>
<p> Program. Please visit this link to learn more:</p>
<p> <a href="http://store.mandriva.com/product_info.php?cPath=149&amp;products_id=490" rel="external nofollow">http://store.mandriva.com/product_info.php?cPath=149&amp;products_id=490</a></p>
<p> </p>
<p> The updated packages have been patched to correct this issue.</p>
]]></description><guid isPermaLink="false">107253</guid><pubDate>Wed, 29 Dec 2010 17:07:15 +0000</pubDate></item><item><title>Advisories  MDVA-2010:241: nss</title><link>https://mandrivausers.org/index.php?/topic/107247-advisories-mdva-2010241-nss/</link><description><![CDATA[
<p>A bug it the NSS source rpm package did not pull in the latest and</p>
<p> required version of NSPR (4.8.6) when building NSS (#61964).</p>
<p> </p>
<p> Additionally the rootcerts package was updated with the latest</p>
<p> certdata.txt file from the mozilla cvs (20101202) and is also provided</p>
<p> with this advisory.</p>
]]></description><guid isPermaLink="false">107247</guid><pubDate>Wed, 29 Dec 2010 17:07:15 +0000</pubDate></item><item><title>Advisories  MDVA-2010:240: mysql</title><link>https://mandrivausers.org/index.php?/topic/107241-advisories-mdva-2010240-mysql/</link><description><![CDATA[
<p>It was discovered that the mysql server was built without partitioning</p>
<p> support. This advisory adds partitioning support to the mysql server.</p>
]]></description><guid isPermaLink="false">107241</guid><pubDate>Wed, 29 Dec 2010 17:07:15 +0000</pubDate></item><item><title>Advisories  MDVSA-2010:251-2: firefox</title><link>https://mandrivausers.org/index.php?/topic/107235-advisories-mdvsa-2010251-2-firefox/</link><description><![CDATA[
<p>Security issues were identified and fixed in firefox:</p>
<p> </p>
<p> Security researchers Yosuke Hasegawa and Masatoshi Kimura reported that</p>
<p> the x-mac-arabic, x-mac-farsi and x-mac-hebrew character encodings are</p>
<p> vulnerable to XSS attacks due to some characters being converted to</p>
<p> angle brackets when displayed by the rendering engine. Sites using</p>
<p> these character encodings would thus be potentially vulnerable to</p>
<p> script injection attacks if their script filtering code fails to</p>
<p> strip out these specific characters (CVE-2010-3770).</p>
<p> </p>
<p> Google security researcher Michal Zalewski reported that when a</p>
<p> window was opened to a site resulting in a network or certificate</p>
<p> error page, the opening site could access the document inside the</p>
<p> opened window and inject arbitrary content. An attacker could use</p>
<p> this bug to spoof the location bar and trick a user into thinking</p>
<p> they were on a different site than they actually were (CVE-2010-3774).</p>
<p> </p>
<p> Mozilla security researcher moz_bug_r_a4 reported that the fix for</p>
<p> CVE-2010-0179 could be circumvented permitting the execution of</p>
<p> arbitrary JavaScript with chrome privileges (CVE-2010-3773).</p>
<p> </p>
<p> Security researcher regenrecht reported via TippingPoint's Zero</p>
<p> Day Initiative that JavaScript arrays were vulnerable to an integer</p>
<p> overflow vulnerability. The report demonstrated that an array could</p>
<p> be constructed containing a very large number of items such that when</p>
<p> memory was allocated to store the array items, the integer value used</p>
<p> to calculate the buffer size would overflow resulting in too small a</p>
<p> buffer being allocated. Subsequent use of the array object could then</p>
<p> result in data being written past the end of the buffer and causing</p>
<p> memory corruption (CVE-2010-3767).</p>
<p> </p>
<p> Security researcher regenrecht reported via TippingPoint's Zero Day</p>
<p> Initiative that a nsDOMAttribute node can be modified without informing</p>
<p> the iterator object responsible for various DOM traversals. This</p>
<p> flaw could lead to a inconsistent state where the iterator points</p>
<p> to an object it believes is part of the DOM but actually points to</p>
<p> some other object. If such an object had been deleted and its memory</p>
<p> reclaimed by the system, then the iterator could be used to call into</p>
<p> attacker-controlled memory (CVE-2010-3766).</p>
<p> </p>
<p> Security researcher Gregory Fleischer reported that when a Java</p>
<p> LiveConnect script was loaded via a data: URL which redirects via a</p>
<p> meta refresh, then the resulting plugin object was created with the</p>
<p> wrong security principal and thus received elevated privileges such</p>
<p> as the abilities to read local files, launch processes, and create</p>
<p> network connections (CVE-2010-3775).</p>
<p> </p>
<p> Mozilla added the OTS font sanitizing library to prevent downloadable</p>
<p> fonts from exposing vulnerabilities in the underlying OS font</p>
<p> code. This library mitigates against several issues independently</p>
<p> reported by Red Hat Security Response Team member Marc Schoenefeld</p>
<p> and Mozilla security researcher Christoph Diehl (CVE-2010-3768).</p>
<p> </p>
<p> Security researcher wushi of team509 reported that when a XUL</p>
<p> tree had an HTML &lt;div&gt; element nested inside a </p>
<p> element then code attempting to display content in the XUL tree would</p>
<p> incorrectly treat the &lt;div&gt; element as a parent node to tree content</p>
<p> underneath it resulting in incorrect indexes being calculated for the</p>
<p> child content. These incorrect indexes were used in subsequent array</p>
<p> operations which resulted in writing data past the end of an allocated</p>
<p> buffer. An attacker could use this issue to crash a victim's browser</p>
<p> and run arbitrary code on their machine (CVE-2010-3772).</p>
<p> </p>
<p> Security researcher echo reported that a web page could open a window</p>
<p> with an about:blank location and then inject an  element</p>
<p> into that page which upon submission would redirect to a chrome:</p>
<p> document. The effect of this defect was that the original page would</p>
<p> wind up with a reference to a chrome-privileged object, the opened</p>
<p> window, which could be leveraged for privilege escalation attacks</p>
<p> (CVE-2010-3771).</p>
<p> </p>
<p> Dirk Heinrich reported that on Windows platforms when document.write()</p>
<p> was called with a very long string a buffer overflow was caused in line</p>
<p> breaking routines attempting to process the string for display. Such</p>
<p> cases triggered an invalid read past the end of an array causing a</p>
<p> crash which an attacker could potentially use to run arbitrary code</p>
<p> on a victim's computer (CVE-2010-3769).</p>
<p> </p>
<p> Mozilla developers identified and fixed several memory safety</p>
<p> bugs in the browser engine used in Firefox and other Mozilla-based</p>
<p> products. Some of these bugs showed evidence of memory corruption</p>
<p> under certain circumstances, and we presume that with enough effort</p>
<p> at least some of these could be exploited to run arbitrary code</p>
<p> (CVE-2010-3776, CVE-2010-3777).</p>
<p> </p>
<p> Packages for 2009.0 are provided as of the Extended Maintenance</p>
<p> Program. Please visit this link to learn more:</p>
<p> <a href="http://store.mandriva.com/product_info.php?cPath=149&amp;products_id=490" rel="external nofollow">http://store.mandriva.com/product_info.php?cPath=149&amp;products_id=490</a></p>
<p> </p>
<p> Additionally, some packages which require so, have been rebuilt and</p>
<p> are being provided as updates.</p>
<p> </p>
<p> Update:</p>
<p> </p>
<p> A mistake was done with the MDVSA-2010:251 and the MDVSA-2010:251-1</p>
<p> advisories where the localization files for firefox software was NOT</p>
<p> updated to the 3.6.13 version. The secteam wishes to apologise for</p>
<p> the unfortunate mistake and also wishes everyone a great christmas.</p>
<p> </p>
<p> Regards // Santa Claus</p>
]]></description><guid isPermaLink="false">107235</guid><pubDate>Wed, 29 Dec 2010 17:07:15 +0000</pubDate></item><item><title>Advisories  MDVSA-2010:251-1: firefox</title><link>https://mandrivausers.org/index.php?/topic/107229-advisories-mdvsa-2010251-1-firefox/</link><description><![CDATA[
<p>Security issues were identified and fixed in firefox:</p>
<p> </p>
<p> Security researchers Yosuke Hasegawa and Masatoshi Kimura reported that</p>
<p> the x-mac-arabic, x-mac-farsi and x-mac-hebrew character encodings are</p>
<p> vulnerable to XSS attacks due to some characters being converted to</p>
<p> angle brackets when displayed by the rendering engine. Sites using</p>
<p> these character encodings would thus be potentially vulnerable to</p>
<p> script injection attacks if their script filtering code fails to</p>
<p> strip out these specific characters (CVE-2010-3770).</p>
<p> </p>
<p> Google security researcher Michal Zalewski reported that when a</p>
<p> window was opened to a site resulting in a network or certificate</p>
<p> error page, the opening site could access the document inside the</p>
<p> opened window and inject arbitrary content. An attacker could use</p>
<p> this bug to spoof the location bar and trick a user into thinking</p>
<p> they were on a different site than they actually were (CVE-2010-3774).</p>
<p> </p>
<p> Mozilla security researcher moz_bug_r_a4 reported that the fix for</p>
<p> CVE-2010-0179 could be circumvented permitting the execution of</p>
<p> arbitrary JavaScript with chrome privileges (CVE-2010-3773).</p>
<p> </p>
<p> Security researcher regenrecht reported via TippingPoint's Zero</p>
<p> Day Initiative that JavaScript arrays were vulnerable to an integer</p>
<p> overflow vulnerability. The report demonstrated that an array could</p>
<p> be constructed containing a very large number of items such that when</p>
<p> memory was allocated to store the array items, the integer value used</p>
<p> to calculate the buffer size would overflow resulting in too small a</p>
<p> buffer being allocated. Subsequent use of the array object could then</p>
<p> result in data being written past the end of the buffer and causing</p>
<p> memory corruption (CVE-2010-3767).</p>
<p> </p>
<p> Security researcher regenrecht reported via TippingPoint's Zero Day</p>
<p> Initiative that a nsDOMAttribute node can be modified without informing</p>
<p> the iterator object responsible for various DOM traversals. This</p>
<p> flaw could lead to a inconsistent state where the iterator points</p>
<p> to an object it believes is part of the DOM but actually points to</p>
<p> some other object. If such an object had been deleted and its memory</p>
<p> reclaimed by the system, then the iterator could be used to call into</p>
<p> attacker-controlled memory (CVE-2010-3766).</p>
<p> </p>
<p> Security researcher Gregory Fleischer reported that when a Java</p>
<p> LiveConnect script was loaded via a data: URL which redirects via a</p>
<p> meta refresh, then the resulting plugin object was created with the</p>
<p> wrong security principal and thus received elevated privileges such</p>
<p> as the abilities to read local files, launch processes, and create</p>
<p> network connections (CVE-2010-3775).</p>
<p> </p>
<p> Mozilla added the OTS font sanitizing library to prevent downloadable</p>
<p> fonts from exposing vulnerabilities in the underlying OS font</p>
<p> code. This library mitigates against several issues independently</p>
<p> reported by Red Hat Security Response Team member Marc Schoenefeld</p>
<p> and Mozilla security researcher Christoph Diehl (CVE-2010-3768).</p>
<p> </p>
<p> Security researcher wushi of team509 reported that when a XUL</p>
<p> tree had an HTML &lt;div&gt; element nested inside a </p>
<p> element then code attempting to display content in the XUL tree would</p>
<p> incorrectly treat the &lt;div&gt; element as a parent node to tree content</p>
<p> underneath it resulting in incorrect indexes being calculated for the</p>
<p> child content. These incorrect indexes were used in subsequent array</p>
<p> operations which resulted in writing data past the end of an allocated</p>
<p> buffer. An attacker could use this issue to crash a victim's browser</p>
<p> and run arbitrary code on their machine (CVE-2010-3772).</p>
<p> </p>
<p> Security researcher echo reported that a web page could open a window</p>
<p> with an about:blank location and then inject an  element</p>
<p> into that page which upon submission would redirect to a chrome:</p>
<p> document. The effect of this defect was that the original page would</p>
<p> wind up with a reference to a chrome-privileged object, the opened</p>
<p> window, which could be leveraged for privilege escalation attacks</p>
<p> (CVE-2010-3771).</p>
<p> </p>
<p> Dirk Heinrich reported that on Windows platforms when document.write()</p>
<p> was called with a very long string a buffer overflow was caused in line</p>
<p> breaking routines attempting to process the string for display. Such</p>
<p> cases triggered an invalid read past the end of an array causing a</p>
<p> crash which an attacker could potentially use to run arbitrary code</p>
<p> on a victim's computer (CVE-2010-3769).</p>
<p> </p>
<p> Mozilla developers identified and fixed several memory safety</p>
<p> bugs in the browser engine used in Firefox and other Mozilla-based</p>
<p> products. Some of these bugs showed evidence of memory corruption</p>
<p> under certain circumstances, and we presume that with enough effort</p>
<p> at least some of these could be exploited to run arbitrary code</p>
<p> (CVE-2010-3776, CVE-2010-3777).</p>
<p> </p>
<p> Packages for 2009.0 are provided as of the Extended Maintenance</p>
<p> Program. Please visit this link to learn more:</p>
<p> <a href="http://store.mandriva.com/product_info.php?cPath=149&amp;products_id=490" rel="external nofollow">http://store.mandriva.com/product_info.php?cPath=149&amp;products_id=490</a></p>
<p> </p>
<p> Additionally, some packages which require so, have been rebuilt and</p>
<p> are being provided as updates.</p>
<p> </p>
<p> Update:</p>
<p> </p>
<p> A mistake was done with the MDVSA-2010:251 advisory where the actual</p>
<p> firefox software was NOT updated to the 3.6.13 version which in</p>
<p> turn lead to that some packages wasn't rebuilt against the correct</p>
<p> version. The secteam wishes to apologise for the misfortunate mistake</p>
<p> and also wishes everyone a great christmas.</p>
<p> </p>
<p> Regards // Santa Claus</p>
]]></description><guid isPermaLink="false">107229</guid><pubDate>Wed, 29 Dec 2010 17:07:15 +0000</pubDate></item><item><title>Advisories  MDVSA-2010:259: pidgin</title><link>https://mandrivausers.org/index.php?/topic/107223-advisories-mdvsa-2010259-pidgin/</link><description><![CDATA[
<p>A null pointer dereference due to receiving a short packet for a direct</p>
<p> connection in the MSN code could potentially cause a denial of service.</p>
<p> </p>
<p> Packages for 2009.0 are provided as of the Extended Maintenance</p>
<p> Program. Please visit this link to learn more:</p>
<p> <a href="http://store.mandriva.com/product_info.php?cPath=149&amp;products_id=490" rel="external nofollow">http://store.mandriva.com/product_info.php?cPath=149&amp;products_id=490</a></p>
<p> </p>
<p> This update provides pidgin 2.7.8 that has been patched to address</p>
<p> this flaw.</p>
]]></description><guid isPermaLink="false">107223</guid><pubDate>Wed, 29 Dec 2010 17:07:15 +0000</pubDate></item><item><title>Advisories  MDVSA-2010:258: mozilla-thunderbird</title><link>https://mandrivausers.org/index.php?/topic/107217-advisories-mdvsa-2010258-mozilla-thunderbird/</link><description><![CDATA[
<p>Security issues were identified and fixed in mozilla-thunderbird:</p>
<p> </p>
<p> Mozilla Firefox before 3.5.16 and 3.6.x before 3.6.13, Thunderbird</p>
<p> before 3.0.11 and 3.1.x before 3.1.7, and SeaMonkey before 2.0.11 do</p>
<p> not properly validate downloadable fonts before use within an operating</p>
<p> system's font implementation, which allows remote attackers to execute</p>
<p> arbitrary code via vectors related to @font-face Cascading Style Sheets</p>
<p> (CSS) rules (CVE-2010-3768).</p>
<p> </p>
<p> The line-breaking implementation in Mozilla Firefox before 3.5.16 and</p>
<p> 3.6.x before 3.6.13, Thunderbird before 3.0.11 and 3.1.x before 3.1.7,</p>
<p> and SeaMonkey before 2.0.11 on Windows does not properly handle long</p>
<p> strings, which allows remote attackers to execute arbitrary code</p>
<p> via a crafted document.write call that triggers a buffer over-read</p>
<p> (CVE-2010-3769).</p>
<p> </p>
<p> Multiple unspecified vulnerabilities in the browser engine in Mozilla</p>
<p> Firefox before 3.5.16 and 3.6.x before 3.6.13, Thunderbird before</p>
<p> 3.0.11 and 3.1.x before 3.1.7, and SeaMonkey before 2.0.11 allow</p>
<p> remote attackers to cause a denial of service (memory corruption and</p>
<p> application crash) or possibly execute arbitrary code via unknown</p>
<p> vectors (CVE-2010-3776).</p>
<p> </p>
<p> Unspecified vulnerability in Mozilla Firefox 3.6.x before 3.6.13</p>
<p> and Thunderbird 3.1.x before 3.1.7 allows remote attackers to cause</p>
<p> a denial of service (memory corruption and application crash) or</p>
<p> possibly execute arbitrary code via unknown vectors (CVE-2010-3777).</p>
<p> </p>
<p> Unspecified vulnerability in Mozilla Firefox 3.5.x before 3.5.16,</p>
<p> Thunderbird before 3.0.11, and SeaMonkey before 2.0.11 allows</p>
<p> remote attackers to cause a denial of service (memory corruption and</p>
<p> application crash) or possibly execute arbitrary code via unknown</p>
<p> vectors (CVE-2010-3778).</p>
<p> </p>
<p> Packages for 2009.0 are provided as of the Extended Maintenance</p>
<p> Program. Please visit this link to learn more:</p>
<p> <a href="http://store.mandriva.com/product_info.php?cPath=149&amp;products_id=490" rel="external nofollow">http://store.mandriva.com/product_info.php?cPath=149&amp;products_id=490</a></p>
<p> </p>
<p> Additionally, some packages which require so, have been rebuilt and</p>
<p> are being provided as updates.</p>
]]></description><guid isPermaLink="false">107217</guid><pubDate>Wed, 29 Dec 2010 17:07:15 +0000</pubDate></item><item><title>Advisories  MDVA-2010:239: mandriva-release</title><link>https://mandrivausers.org/index.php?/topic/107211-advisories-mdva-2010239-mandriva-release/</link><description><![CDATA[
<p>This update provides a visual refresh for packages artwork to mark</p>
<p> the Mandriva 2010.2 release.</p>
]]></description><guid isPermaLink="false">107211</guid><pubDate>Wed, 29 Dec 2010 17:07:15 +0000</pubDate></item><item><title>Advisories  MDVSA-2010:256: git</title><link>https://mandrivausers.org/index.php?/topic/107205-advisories-mdvsa-2010256-git/</link><description><![CDATA[
<p>A vulnerability was discovered and corrected in git (gitweb):</p>
<p> </p>
<p> A cross-site scripting (XSS) vulnerability in Gitweb 1.7.3.3 and</p>
<p> previous versions allows remote attackers to inject arbitrary web</p>
<p> script or HTML code via f and fp variables (CVE-2010-3906).</p>
<p> </p>
<p> The updated packages have been patched to correct this issue.</p>
]]></description><guid isPermaLink="false">107205</guid><pubDate>Wed, 29 Dec 2010 17:07:15 +0000</pubDate></item><item><title>Advisories  MDVSA-2010:255: php-intl</title><link>https://mandrivausers.org/index.php?/topic/107199-advisories-mdvsa-2010255-php-intl/</link><description><![CDATA[
<p>A vulnerability was discovered and corrected in php-intl:</p>
<p> </p>
<p> Integer overflow in the NumberFormatter::getSymbol (aka</p>
<p> numfmt_get_symbol) function in PHP 5.3.3 and earlier allows</p>
<p> context-dependent attackers to cause a denial of service (application</p>
<p> crash) via an invalid argument (CVE-2010-4409).</p>
<p> </p>
<p> The updated packages have been upgraded to php-intl-1.1.2 and patched</p>
<p> to correct this issue.</p>
]]></description><guid isPermaLink="false">107199</guid><pubDate>Wed, 29 Dec 2010 17:07:15 +0000</pubDate></item><item><title>Advisories  MDVA-2010:238: php</title><link>https://mandrivausers.org/index.php?/topic/107109-advisories-mdva-2010238-php/</link><description><![CDATA[
<p>This is a maintenance update that upgrades php to 5.2.15 for</p>
<p> CS4/MES5/2009.0.</p>
<p> </p>
<p> Key enhancements in PHP 5.2.15 include:</p>
<p> </p>
<p>  * Fixed bug #47643 (array_diff() takes over 3000 times longer than</p>
<p>  php 5.2.4).</p>
<p>  * Fixed bug #44248 (RFC2616 transgression while HTTPS request through</p>
<p>  proxy with SoapClient object).</p>
<p> </p>
<p> Additional post 5.2.15 fixes:</p>
<p> </p>
<p>  * Fixed bug #53516 (Regression in open_basedir handling).</p>
<p>  * Fixed bug #53517 (segfault in pgsql_stmt_execute() when postgres</p>
<p>  is down).</p>
<p> </p>
<p> Additionally some of the PECL extensions has been upgraded and/or</p>
<p> rebuilt for the new php version.</p>
<p> </p>
<p> Packages for 2009.0 are provided as of the Extended Maintenance</p>
<p> Program. Please visit this link to learn more:</p>
<p> <a href="http://store.mandriva.com/product_info.php?cPath=149&amp;products_id=490" rel="external nofollow">http://store.mandriva.com/product_info.php?cPath=149&amp;products_id=490</a></p>
]]></description><guid isPermaLink="false">107109</guid><pubDate>Wed, 15 Dec 2010 11:19:37 +0000</pubDate></item><item><title>Advisories  MDVSA-2010:253: bind</title><link>https://mandrivausers.org/index.php?/topic/107103-advisories-mdvsa-2010253-bind/</link><description><![CDATA[
<p>Multiple vulnerabilities were discovered and corrected in bind:</p>
<p> </p>
<p> named in ISC BIND 9.6.2 before 9.6.2-P3, 9.6-ESV before 9.6-ESV-R3,</p>
<p> and 9.7.x before 9.7.2-P3 does not properly handle the combination</p>
<p> of signed negative responses and corresponding RRSIG records in the</p>
<p> cache, which allows remote attackers to cause a denial of service</p>
<p> (daemon crash) via a query for cached data (CVE-2010-3613).</p>
<p> </p>
<p> named in ISC BIND 9.x before 9.6.2-P3, 9.7.x before 9.7.2-P3,</p>
<p> 9.4-ESV before 9.4-ESV-R4, and 9.6-ESV before 9.6-ESV-R3 does not</p>
<p> properly determine the security status of an NS RRset during a DNSKEY</p>
<p> algorithm rollover, which might allow remote attackers to cause a</p>
<p> denial of service (DNSSEC validation error) by triggering a rollover</p>
<p> (CVE-2010-3614).</p>
<p> </p>
<p> ISC BIND before 9.7.2-P2, when DNSSEC validation is enabled, does</p>
<p> not properly handle certain bad signatures if multiple trust anchors</p>
<p> exist for a single zone, which allows remote attackers to cause a</p>
<p> denial of service (daemon crash) via a DNS query (CVE-2010-3762).</p>
<p> </p>
<p> Packages for 2009.0 are provided as of the Extended Maintenance</p>
<p> Program. Please visit this link to learn more:</p>
<p> <a href="http://store.mandriva.com/product_info.php?cPath=149&amp;products_id=490" rel="external nofollow">http://store.mandriva.com/product_info.php?cPath=149&amp;products_id=490</a></p>
<p> </p>
<p> The updated packages for Corporate Server 4.0 has been patched to</p>
<p> address these issues.</p>
<p> </p>
<p> The updated packages for Mandriva Linux 2009.0, 2010.0 and Mandriva</p>
<p> Linux Enterprise Server 5.1 has been upgraded to bind-9.6.2-P3 and</p>
<p> patched to address the CVE-2010-3762 security issue.</p>
<p> </p>
<p> The updated packages for Mandriva Linux 2010.1 has been upgraded to</p>
<p> bind-9.7.2-P3 which is not vulnerable to these issues.</p>
]]></description><guid isPermaLink="false">107103</guid><pubDate>Wed, 15 Dec 2010 02:36:24 +0000</pubDate></item><item><title>Advisories  MDVSA-2010:252: perl-CGI-Simple</title><link>https://mandrivausers.org/index.php?/topic/107097-advisories-mdvsa-2010252-perl-cgi-simple/</link><description><![CDATA[
<p>A vulnerability was discovered and corrected in perl-CGI-Simple:</p>
<p> </p>
<p> CRLF injection vulnerability in the header function in (1) CGI.pm</p>
<p> before 3.50 and (2) Simple.pm in CGI::Simple 1.112 and earlier allows</p>
<p> remote attackers to inject arbitrary HTTP headers and conduct HTTP</p>
<p> response splitting attacks via vectors related to non-whitespace</p>
<p> characters preceded by newline characters, a different vulnerability</p>
<p> than CVE-2010-2761 and CVE-2010-3172 (CVE-2010-4410).</p>
<p> </p>
<p> The updated packages have been patched to correct this issue.</p>
]]></description><guid isPermaLink="false">107097</guid><pubDate>Wed, 15 Dec 2010 02:36:24 +0000</pubDate></item><item><title>Advisories  MDVSA-2010:251: firefox</title><link>https://mandrivausers.org/index.php?/topic/107079-advisories-mdvsa-2010251-firefox/</link><description><![CDATA[
<p>Security issues were identified and fixed in firefox:</p>
<p> </p>
<p> Security researchers Yosuke Hasegawa and Masatoshi Kimura reported that</p>
<p> the x-mac-arabic, x-mac-farsi and x-mac-hebrew character encodings are</p>
<p> vulnerable to XSS attacks due to some characters being converted to</p>
<p> angle brackets when displayed by the rendering engine. Sites using</p>
<p> these character encodings would thus be potentially vulnerable to</p>
<p> script injection attacks if their script filtering code fails to</p>
<p> strip out these specific characters (CVE-2010-3770).</p>
<p> </p>
<p> Google security researcher Michal Zalewski reported that when a</p>
<p> window was opened to a site resulting in a network or certificate</p>
<p> error page, the opening site could access the document inside the</p>
<p> opened window and inject arbitrary content. An attacker could use</p>
<p> this bug to spoof the location bar and trick a user into thinking</p>
<p> they were on a different site than they actually were (CVE-2010-3774).</p>
<p> </p>
<p> Mozilla security researcher moz_bug_r_a4 reported that the fix for</p>
<p> CVE-2010-0179 could be circumvented permitting the execution of</p>
<p> arbitrary JavaScript with chrome privileges (CVE-2010-3773).</p>
<p> </p>
<p> Security researcher regenrecht reported via TippingPoint's Zero</p>
<p> Day Initiative that JavaScript arrays were vulnerable to an integer</p>
<p> overflow vulnerability. The report demonstrated that an array could</p>
<p> be constructed containing a very large number of items such that when</p>
<p> memory was allocated to store the array items, the integer value used</p>
<p> to calculate the buffer size would overflow resulting in too small a</p>
<p> buffer being allocated. Subsequent use of the array object could then</p>
<p> result in data being written past the end of the buffer and causing</p>
<p> memory corruption (CVE-2010-3767).</p>
<p> </p>
<p> Security researcher regenrecht reported via TippingPoint's Zero Day</p>
<p> Initiative that a nsDOMAttribute node can be modified without informing</p>
<p> the iterator object responsible for various DOM traversals. This</p>
<p> flaw could lead to a inconsistent state where the iterator points</p>
<p> to an object it believes is part of the DOM but actually points to</p>
<p> some other object. If such an object had been deleted and its memory</p>
<p> reclaimed by the system, then the iterator could be used to call into</p>
<p> attacker-controlled memory (CVE-2010-3766).</p>
<p> </p>
<p> Security researcher Gregory Fleischer reported that when a Java</p>
<p> LiveConnect script was loaded via a data: URL which redirects via a</p>
<p> meta refresh, then the resulting plugin object was created with the</p>
<p> wrong security principal and thus received elevated privileges such</p>
<p> as the abilities to read local files, launch processes, and create</p>
<p> network connections (CVE-2010-3775).</p>
<p> </p>
<p> Mozilla added the OTS font sanitizing library to prevent downloadable</p>
<p> fonts from exposing vulnerabilities in the underlying OS font</p>
<p> code. This library mitigates against several issues independently</p>
<p> reported by Red Hat Security Response Team member Marc Schoenefeld</p>
<p> and Mozilla security researcher Christoph Diehl (CVE-2010-3768).</p>
<p> </p>
<p> Security researcher wushi of team509 reported that when a XUL</p>
<p> tree had an HTML &lt;div&gt; element nested inside a </p>
<p> element then code attempting to display content in the XUL tree would</p>
<p> incorrectly treat the &lt;div&gt; element as a parent node to tree content</p>
<p> underneath it resulting in incorrect indexes being calculated for the</p>
<p> child content. These incorrect indexes were used in subsequent array</p>
<p> operations which resulted in writing data past the end of an allocated</p>
<p> buffer. An attacker could use this issue to crash a victim's browser</p>
<p> and run arbitrary code on their machine (CVE-2010-3772).</p>
<p> </p>
<p> Security researcher echo reported that a web page could open a window</p>
<p> with an about:blank location and then inject an  element</p>
<p> into that page which upon submission would redirect to a chrome:</p>
<p> document. The effect of this defect was that the original page would</p>
<p> wind up with a reference to a chrome-privileged object, the opened</p>
<p> window, which could be leveraged for privilege escalation attacks</p>
<p> (CVE-2010-3771).</p>
<p> </p>
<p> Dirk Heinrich reported that on Windows platforms when document.write()</p>
<p> was called with a very long string a buffer overflow was caused in line</p>
<p> breaking routines attempting to process the string for display. Such</p>
<p> cases triggered an invalid read past the end of an array causing a</p>
<p> crash which an attacker could potentially use to run arbitrary code</p>
<p> on a victim's computer (CVE-2010-3769).</p>
<p> </p>
<p> Mozilla developers identified and fixed several memory safety</p>
<p> bugs in the browser engine used in Firefox and other Mozilla-based</p>
<p> products. Some of these bugs showed evidence of memory corruption</p>
<p> under certain circumstances, and we presume that with enough effort</p>
<p> at least some of these could be exploited to run arbitrary code</p>
<p> (CVE-2010-3776, CVE-2010-3777).</p>
<p> </p>
<p> Packages for 2009.0 are provided as of the Extended Maintenance</p>
<p> Program. Please visit this link to learn more:</p>
<p> <a href="http://store.mandriva.com/product_info.php?cPath=149&amp;products_id=490" rel="external nofollow">http://store.mandriva.com/product_info.php?cPath=149&amp;products_id=490</a></p>
<p> </p>
<p> Additionally, some packages which require so, have been rebuilt and</p>
<p> are being provided as updates.</p>
]]></description><guid isPermaLink="false">107079</guid><pubDate>Fri, 10 Dec 2010 09:45:10 +0000</pubDate></item><item><title>Advisories  MDVSA-2010:251: firefox</title><link>https://mandrivausers.org/index.php?/topic/107061-advisories-mdvsa-2010251-firefox/</link><description><![CDATA[
<p>Security issues were identified and fixed in firefox:</p>
<p> </p>
<p> Security researchers Yosuke Hasegawa and Masatoshi Kimura reported that</p>
<p> the x-mac-arabic, x-mac-farsi and x-mac-hebrew character encodings are</p>
<p> vulnerable to XSS attacks due to some characters being converted to</p>
<p> angle brackets when displayed by the rendering engine. Sites using</p>
<p> these character encodings would thus be potentially vulnerable to</p>
<p> script injection attacks if their script filtering code fails to</p>
<p> strip out these specific characters (CVE-2010-3770).</p>
<p> </p>
<p> Google security researcher Michal Zalewski reported that when a</p>
<p> window was opened to a site resulting in a network or certificate</p>
<p> error page, the opening site could access the document inside the</p>
<p> opened window and inject arbitrary content. An attacker could use</p>
<p> this bug to spoof the location bar and trick a user into thinking</p>
<p> they were on a different site than they actually were (CVE-2010-3774).</p>
<p> </p>
<p> Mozilla security researcher moz_bug_r_a4 reported that the fix for</p>
<p> CVE-2010-0179 could be circumvented permitting the execution of</p>
<p> arbitrary JavaScript with chrome privileges (CVE-2010-3773).</p>
<p> </p>
<p> Security researcher regenrecht reported via TippingPoint's Zero</p>
<p> Day Initiative that JavaScript arrays were vulnerable to an integer</p>
<p> overflow vulnerability. The report demonstrated that an array could</p>
<p> be constructed containing a very large number of items such that when</p>
<p> memory was allocated to store the array items, the integer value used</p>
<p> to calculate the buffer size would overflow resulting in too small a</p>
<p> buffer being allocated. Subsequent use of the array object could then</p>
<p> result in data being written past the end of the buffer and causing</p>
<p> memory corruption (CVE-2010-3767).</p>
<p> </p>
<p> Security researcher regenrecht reported via TippingPoint's Zero Day</p>
<p> Initiative that a nsDOMAttribute node can be modified without informing</p>
<p> the iterator object responsible for various DOM traversals. This</p>
<p> flaw could lead to a inconsistent state where the iterator points</p>
<p> to an object it believes is part of the DOM but actually points to</p>
<p> some other object. If such an object had been deleted and its memory</p>
<p> reclaimed by the system, then the iterator could be used to call into</p>
<p> attacker-controlled memory (CVE-2010-3766).</p>
<p> </p>
<p> Security researcher Gregory Fleischer reported that when a Java</p>
<p> LiveConnect script was loaded via a data: URL which redirects via a</p>
<p> meta refresh, then the resulting plugin object was created with the</p>
<p> wrong security principal and thus received elevated privileges such</p>
<p> as the abilities to read local files, launch processes, and create</p>
<p> network connections (CVE-2010-3775).</p>
<p> </p>
<p> Mozilla added the OTS font sanitizing library to prevent downloadable</p>
<p> fonts from exposing vulnerabilities in the underlying OS font</p>
<p> code. This library mitigates against several issues independently</p>
<p> reported by Red Hat Security Response Team member Marc Schoenefeld</p>
<p> and Mozilla security researcher Christoph Diehl (CVE-2010-3768).</p>
<p> </p>
<p> Security researcher wushi of team509 reported that when a XUL tree</p>
<p> had an HTML &lt;div&gt; element nested inside a  element then</p>
<p> code attempting to display content in the XUL tree would incorrectly</p>
<p> treat the &lt;div&gt; element as a parent node to tree content underneath</p>
<p> it resulting in incorrect indexes being calculated for the child</p>
<p> content. These incorrect indexes were used in subsequent array</p>
<p> operations which resulted in writing data past the end of an allocated</p>
<p> buffer. An attacker could use this issue to crash a victim's browser</p>
<p> and run arbitrary code on their machine (CVE-2010-3772).</p>
<p> </p>
<p> Security researcher echo reported that a web page could open a window</p>
<p> with an about:blank location and then inject an  element</p>
<p> into that page which upon submission would redirect to a chrome:</p>
<p> document. The effect of this defect was that the original page would</p>
<p> wind up with a reference to a chrome-privileged object, the opened</p>
<p> window, which could be leveraged for privilege escalation attacks</p>
<p> (CVE-2010-3771).</p>
<p> </p>
<p> Dirk Heinrich reported that on Windows platforms when document.write()</p>
<p> was called with a very long string a buffer overflow was caused in line</p>
<p> breaking routines attempting to process the string for display. Such</p>
<p> cases triggered an invalid read past the end of an array causing a</p>
<p> crash which an attacker could potentially use to run arbitrary code</p>
<p> on a victim's computer (CVE-2010-3769).</p>
<p> </p>
<p> Mozilla developers identified and fixed several memory safety</p>
<p> bugs in the browser engine used in Firefox and other Mozilla-based</p>
<p> products. Some of these bugs showed evidence of memory corruption</p>
<p> under certain circumstances, and we presume that with enough effort</p>
<p> at least some of these could be exploited to run arbitrary code</p>
<p> (CVE-2010-3776, CVE-2010-3777).</p>
<p> </p>
<p> Packages for 2009.0 are provided as of the Extended Maintenance</p>
<p> Program. Please visit this link to learn more:</p>
<p> <a href="http://store.mandriva.com/product_info.php?cPath=149&amp;products_id=490" rel="external nofollow">http://store.mandriva.com/product_info.php?cPath=149&amp;products_id=490</a></p>
<p> </p>
<p> Additionally, some packages which require so, have been rebuilt and</p>
<p> are being provided as updates.</p>
]]></description><guid isPermaLink="false">107061</guid><pubDate>Fri, 10 Dec 2010 01:26:32 +0000</pubDate></item><item><title>Advisories  MDVSA-2010:250: perl-CGI-Simple</title><link>https://mandrivausers.org/index.php?/topic/107055-advisories-mdvsa-2010250-perl-cgi-simple/</link><description><![CDATA[
<p>A vulnerability was discovered and corrected in perl-CGI-Simple:</p>
<p> </p>
<p> The multipart_init function in (1) CGI.pm before 3.50 and (2) Simple.pm</p>
<p> in CGI::Simple 1.112 and earlier uses a hardcoded value of the MIME</p>
<p> boundary string in multipart/x-mixed-replace content, which allows</p>
<p> remote attackers to inject arbitrary HTTP headers and conduct HTTP</p>
<p> response splitting attacks via crafted input that contains this value,</p>
<p> a different vulnerability than CVE-2010-3172 (CVE-2010-2761).</p>
<p> </p>
<p> The updated packages have been patched to correct this issue.</p>
]]></description><guid isPermaLink="false">107055</guid><pubDate>Thu, 09 Dec 2010 13:50:24 +0000</pubDate></item><item><title>Advisories  MDVA-2010:237: libxt</title><link>https://mandrivausers.org/index.php?/topic/107049-advisories-mdva-2010237-libxt/</link><description><![CDATA[
<p>If the fonts required by libXt are not present, a lot of time is spent</p>
<p> looking for them, which makes simple apps like xmessage and xcalc</p>
<p> take almost 10 seconds to start on systems with a lot of fonts. This</p>
<p> update makes the application startup time go back to normal.</p>
]]></description><guid isPermaLink="false">107049</guid><pubDate>Thu, 09 Dec 2010 13:50:24 +0000</pubDate></item><item><title>Advisories  MDVA-2010:236: krb5-appl</title><link>https://mandrivausers.org/index.php?/topic/107043-advisories-mdva-2010236-krb5-appl/</link><description><![CDATA[
<p>krb5-appl now provides telnet to avoid breaking dependencies from</p>
<p> package wich require it (ie: heartbeat-stonith).</p>
<p> telnet was previously provided by telnet-client-krb5.</p>
]]></description><guid isPermaLink="false">107043</guid><pubDate>Thu, 09 Dec 2010 09:19:23 +0000</pubDate></item><item><title>Advisories  MDVA-2010:235: keychain</title><link>https://mandrivausers.org/index.php?/topic/107031-advisories-mdva-2010235-keychain/</link><description><![CDATA[
<p>Due to a bug in the keychain package the '--noask' option wasn't always</p>
<p> used, this caused the Qt4 ssh-askpass dialogue to get loaded before a</p>
<p> window manager was fully-started, preventing the user from entering the</p>
<p> passphrase as the dialogue never gets focus without a window manager</p>
<p> running. This update fixes this issue by insuring the '--noask'</p>
<p> option is used when logging into a DE (the Qt4 ssh-askpass dialogue</p>
<p> is only shown when the user opens a new terminal emulator window).</p>
]]></description><guid isPermaLink="false">107031</guid><pubDate>Wed, 08 Dec 2010 17:32:30 +0000</pubDate></item><item><title>Advisories  MDVSA-2010:249: clamav</title><link>https://mandrivausers.org/index.php?/topic/107025-advisories-mdvsa-2010249-clamav/</link><description><![CDATA[
<p>Multiple vulnerabilities were discovered and corrected in clamav:</p>
<p> </p>
<p> Multiple unspecified vulnerabilities in pdf.c in libclamav in ClamAV</p>
<p> before 0.96.5 allow remote attackers to cause a denial of service</p>
<p> (application crash) or possibly execute arbitrary code via a crafted</p>
<p> PDF document (CVE-2010-4260, (CVE-2010-4479).</p>
<p> </p>
<p> Off-by-one error in the icon_cb function in pe_icons.c in libclamav</p>
<p> in ClamAV before 0.96.5 allows remote attackers to cause a denial of</p>
<p> service (memory corruption and application crash) or possibly execute</p>
<p> arbitrary code via unspecified vectors.  NOTE: some of these details</p>
<p> are obtained from third party information (CVE-2010-4261).</p>
<p> </p>
<p> Packages for 2009.0 are provided as of the Extended Maintenance</p>
<p> Program. Please visit this link to learn more:</p>
<p> <a href="http://store.mandriva.com/product_info.php?cPath=149&amp;products_id=490" rel="external nofollow">http://store.mandriva.com/product_info.php?cPath=149&amp;products_id=490</a></p>
<p> </p>
<p> The updated clamav packages have been upgraded to the 0.96.5 version</p>
<p> that is not vulnerable to these issues.</p>
]]></description><guid isPermaLink="false">107025</guid><pubDate>Tue, 07 Dec 2010 15:34:38 +0000</pubDate></item><item><title>Advisories  MDVSA-2010:248: openssl</title><link>https://mandrivausers.org/index.php?/topic/107019-advisories-mdvsa-2010248-openssl/</link><description><![CDATA[
<p>A vulnerability was discovered and corrected in openssl:</p>
<p> </p>
<p> OpenSSL before 0.9.8q, and 1.0.x before 1.0.0c, when</p>
<p> SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG is enabled, does not properly</p>
<p> prevent modification of the ciphersuite in the session cache, which</p>
<p> allows remote attackers to force the use of an unintended cipher</p>
<p> via vectors involving sniffing network traffic to discover a session</p>
<p> identifier (CVE-2010-4180).</p>
<p> </p>
<p> Packages for 2009.0 are provided as of the Extended Maintenance</p>
<p> Program. Please visit this link to learn more:</p>
<p> <a href="http://store.mandriva.com/product_info.php?cPath=149&amp;products_id=490" rel="external nofollow">http://store.mandriva.com/product_info.php?cPath=149&amp;products_id=490</a></p>
<p> </p>
<p> The updated packages have been patched to correct this issue.</p>
]]></description><guid isPermaLink="false">107019</guid><pubDate>Tue, 07 Dec 2010 15:04:21 +0000</pubDate></item><item><title>Advisories  MDVSA-2010:247: kernel</title><link>https://mandrivausers.org/index.php?/topic/106995-advisories-mdvsa-2010247-kernel/</link><description><![CDATA[
<p>A vulnerability was discovered and corrected in the Linux 2.6 kernel:</p>
<p> </p>
<p> The compat_alloc_user_space functions in include/asm/compat.h files</p>
<p> in the Linux kernel before 2.6.36-rc4-git2 on 64-bit platforms do</p>
<p> not properly allocate the userspace memory required for the 32-bit</p>
<p> compatibility layer, which allows local users to gain privileges by</p>
<p> leveraging the ability of the compat_mc_getsockopt function (aka the</p>
<p> MCAST_MSFILTER getsockopt support) to control a certain length value,</p>
<p> related to a stack pointer underflow issue, as exploited in the wild</p>
<p> in September 2010. (CVE-2010-3081)</p>
<p> </p>
<p> The IA32 system call emulation functionality in</p>
<p> arch/x86/ia32/ia32entry.S in the Linux kernel before 2.6.36-rc4-git2</p>
<p> on the x86_64 platform does not zero extend the %eax register after</p>
<p> the 32-bit entry path to ptrace is used, which allows local users to</p>
<p> gain privileges by triggering an out-of-bounds access to the system</p>
<p> call table using the %rax register.  NOTE: this vulnerability exists</p>
<p> because of a CVE-2007-4573 regression. (CVE-2010-3301)</p>
<p> </p>
<p> Integer overflow in the ext4_ext_get_blocks function in</p>
<p> fs/ext4/extents.c in the Linux kernel before 2.6.34 allows local</p>
<p> users to cause a denial of service (BUG and system crash) via a</p>
<p> write operation on the last block of a large file, followed by a sync</p>
<p> operation. (CVE-2010-3015)</p>
<p> </p>
<p> Additionally, the kernel has been updated to the stable version</p>
<p> 2.6.31.14. A timeout bug in bnx2 has been fixed. Muting and unmuting</p>
<p> on VT1812/VT2002P now should work correctly. A fix for ACL decoding</p>
<p> on NFS was added. Rebooting on Dell Precision WorkStation T7400 was</p>
<p> corrected. Read balancing with RAID0 and RAID1 on drives larger then</p>
<p> 2TB was also fixed. A more detailed description is available in the</p>
<p> package changelog and related tickets.</p>
<p> </p>
<p> Thanks to Thomas Backlund and Herton Ronaldo Krzesinski for</p>
<p> contributions in this update.</p>
<p> </p>
<p> To update your kernel, please follow the directions located at:</p>
<p> </p>
<p>   <a href="http://www.mandriva.com/en/security/kernelupdate" rel="external nofollow">http://www.mandriva.com/en/security/kernelupdate</a></p>
]]></description><guid isPermaLink="false">106995</guid><pubDate>Fri, 03 Dec 2010 17:21:33 +0000</pubDate></item><item><title>Advisories  MDVA-2010:234: libxaw</title><link>https://mandrivausers.org/index.php?/topic/106989-advisories-mdva-2010234-libxaw/</link><description><![CDATA[
<p>* Some applications that use libXaw were printing error messages</p>
<p> when started. Their appearance was also slightly different from</p>
<p> the expected. This update stops the error messages and fixes their</p>
<p> appearance.</p>
<p> </p>
<p> * The libXaw package had a poor description. This updates improves</p>
<p> the package description and summary.</p>
]]></description><guid isPermaLink="false">106989</guid><pubDate>Thu, 02 Dec 2010 22:22:33 +0000</pubDate></item><item><title>Advisories  MDVA-2010:233: nautilus-sendto</title><link>https://mandrivausers.org/index.php?/topic/106971-advisories-mdva-2010233-nautilus-sendto/</link><description><![CDATA[
<p>nautilus-sendto would crash on startup. This update was rebuilt with</p>
<p> the right linking flags corrects the problem.</p>
]]></description><guid isPermaLink="false">106971</guid><pubDate>Wed, 01 Dec 2010 16:19:41 +0000</pubDate></item><item><title>Advisories  MDVSA-2010:246: krb5</title><link>https://mandrivausers.org/index.php?/topic/106959-advisories-mdvsa-2010246-krb5/</link><description><![CDATA[
<p>Multiple vulnerabilities were discovered and corrected in krb5:</p>
<p> </p>
<p> An unauthenticated remote attacker could alter a SAM-2 challenge,</p>
<p> affecting the prompt text seen by the user or the kind of response</p>
<p> sent to the KDC. Under some circumstances, this can negate the</p>
<p> incremental security benefit of using a single-use authentication</p>
<p> mechanism token. An unauthenticated remote attacker has a 1/256</p>
<p> chance of forging KRB-SAFE messages in an application protocol if the</p>
<p> targeted pre-existing session uses an RC4 session key.  Few application</p>
<p> protocols use KRB-SAFE messages (CVE-2010-1323).</p>
<p> </p>
<p> An unauthenticated remote attacker can forge GSS tokens that</p>
<p> are intended to be integrity-protected but unencrypted, if the</p>
<p> targeted pre-existing application session uses a DES session key. An</p>
<p> authenticated remote attacker can forge PACs if using a KDC that does</p>
<p> not filter client-provided PAC data.  This can result in privilege</p>
<p> escalation against a service that relies on PAC contents to make</p>
<p> authorization decisions. An unauthenticated remote attacker has a 1/256</p>
<p> chance of swapping a client-issued KrbFastReq into a different KDC-REQ,</p>
<p> if the armor key is RC4.  The consequences are believed to be minor</p>
<p> (CVE-2010-1324).</p>
<p> </p>
<p> An authenticated remote attacker that controls a legitimate service</p>
<p> principal has a 1/256 chance of forging the AD-SIGNEDPATH signature</p>
<p> if the TGT key is RC4, allowing it to use self-generated evidence</p>
<p> tickets for S4U2Proxy, instead of tickets obtained from the user or</p>
<p> with S4U2Self.  Configurations using RC4 for the TGT key are believed</p>
<p> to be rare. An authenticated remote attacker has a 1/256 chance of</p>
<p> forging AD-KDC-ISSUED signatures on authdata elements in tickets</p>
<p> having an RC4 service key, resulting in privilege escalation against</p>
<p> a service that relies on these signatures.  There are no known uses</p>
<p> of the KDC-ISSUED authdata container at this time (CVE-2010-4020.</p>
<p> </p>
<p> An authenticated remote attacker that controls a legitimate service</p>
<p> principal could obtain a valid service ticket to itself containing</p>
<p> valid KDC-generated authorization data for a client whose TGS-REQ</p>
<p> it has intercepted.  The attacker could then use this ticket for</p>
<p> S4U2Proxy to impersonate the targeted client even if the client never</p>
<p> authenticated to the subverted service.  The vulnerable configuration</p>
<p> is believed to be rare (CVE-2010-4021).</p>
<p> </p>
<p> The updated packages have been patched to correct this issue.</p>
]]></description><guid isPermaLink="false">106959</guid><pubDate>Wed, 01 Dec 2010 01:02:41 +0000</pubDate></item><item><title>Advisories  MDVSA-2010:245: krb5</title><link>https://mandrivausers.org/index.php?/topic/106953-advisories-mdvsa-2010245-krb5/</link><description><![CDATA[
<p>A vulnerability was discovered and corrected in krb5:</p>
<p> </p>
<p> An unauthenticated remote attacker could alter a SAM-2 challenge,</p>
<p> affecting the prompt text seen by the user or the kind of response</p>
<p> sent to the KDC. Under some circumstances, this can negate the</p>
<p> incremental security benefit of using a single-use authentication</p>
<p> mechanism token. An unauthenticated remote attacker has a 1/256</p>
<p> chance of forging KRB-SAFE messages in an application protocol if the</p>
<p> targeted pre-existing session uses an RC4 session key.  Few application</p>
<p> protocols use KRB-SAFE messages (CVE-2010-1323).</p>
<p> </p>
<p> Packages for 2009.0 are provided as of the Extended Maintenance</p>
<p> Program. Please visit this link to learn more:</p>
<p> <a href="http://store.mandriva.com/product_info.php?cPath=149&amp;products_id=490" rel="external nofollow">http://store.mandriva.com/product_info.php?cPath=149&amp;products_id=490</a></p>
<p> </p>
<p> The updated packages have been patched to correct this issue.</p>
]]></description><guid isPermaLink="false">106953</guid><pubDate>Tue, 30 Nov 2010 23:29:15 +0000</pubDate></item><item><title>Advisories  MDVSA-2010:244: phpmyadmin</title><link>https://mandrivausers.org/index.php?/topic/106947-advisories-mdvsa-2010244-phpmyadmin/</link><description><![CDATA[
<p>A vulnerability has been found and corrected in phpmyadmin:</p>
<p> </p>
<p> It was possible to conduct a XSS attack using spoofed request on the</p>
<p> db search script (CVE-2010-4329).</p>
<p> </p>
<p> This upgrade provides the latest phpmyadmin versions which is not</p>
<p> vulnerable to this security issue.</p>
]]></description><guid isPermaLink="false">106947</guid><pubDate>Tue, 30 Nov 2010 10:20:00 +0000</pubDate></item><item><title>Advisories  MDVSA-2010:243: libxml2</title><link>https://mandrivausers.org/index.php?/topic/106929-advisories-mdvsa-2010243-libxml2/</link><description><![CDATA[
<p>A vulnerability was discovered and corrected in libxml2:</p>
<p> </p>
<p> libxml2 before 2.7.8 reads from invalid memory locations</p>
<p> during processing of malformed XPath expressions, which allows</p>
<p> context-dependent attackers to cause a denial of service (application</p>
<p> crash) via a crafted XML document (CVE-2010-4008).</p>
<p> </p>
<p> Packages for 2009.0 are provided as of the Extended Maintenance</p>
<p> Program. Please visit this link to learn more:</p>
<p> <a href="http://store.mandriva.com/product_info.php?cPath=149&amp;products_id=490" rel="external nofollow">http://store.mandriva.com/product_info.php?cPath=149&amp;products_id=490</a></p>
<p> </p>
<p> The updated packages have been patched to correct these issues.</p>
]]></description><guid isPermaLink="false">106929</guid><pubDate>Mon, 29 Nov 2010 15:26:44 +0000</pubDate></item><item><title>Advisories  MDVSA-2010:242: wireshark</title><link>https://mandrivausers.org/index.php?/topic/106905-advisories-mdvsa-2010242-wireshark/</link><description><![CDATA[
<p>This advisory updates wireshark to the latest version (1.2.13),</p>
<p> fixing one security issue:</p>
<p> </p>
<p> Heap-based buffer overflow in the dissect_ldss_transfer function</p>
<p> (epan/dissectors/packet-ldss.c) in the LDSS dissector in Wireshark</p>
<p> 1.2.0 through 1.2.12 and 1.4.0 through 1.4.1 allows remote attackers</p>
<p> to cause a denial of service (crash) and possibly execute arbitrary</p>
<p> code via an LDSS packet with a long digest line that triggers memory</p>
<p> corruption (CVE-2010-4300).</p>
]]></description><guid isPermaLink="false">106905</guid><pubDate>Sun, 28 Nov 2010 13:05:21 +0000</pubDate></item><item><title>Advisories  MDVA-2010:232: pidgin</title><link>https://mandrivausers.org/index.php?/topic/106893-advisories-mdva-2010232-pidgin/</link><description><![CDATA[
<p>This is a bugfix and maintenance advisory that upgrades pidgin to the</p>
<p> latest version (2.7.7) that addresses various issues with upstream</p>
<p> service providers (icq, msn).</p>
<p> </p>
<p> Packages for 2009.0 are provided as of the Extended Maintenance</p>
<p> Program. Please visit this link to learn more:</p>
<p> <a href="http://store.mandriva.com/product_info.php?cPath=149&amp;products_id=490" rel="external nofollow">http://store.mandriva.com/product_info.php?cPath=149&amp;products_id=490</a></p>
]]></description><guid isPermaLink="false">106893</guid><pubDate>Thu, 25 Nov 2010 12:13:12 +0000</pubDate></item><item><title>Advisories  MDVA-2010:231: x11-driver-input-evtouch</title><link>https://mandrivausers.org/index.php?/topic/106887-advisories-mdva-2010231-x11-driver-input-evtouch/</link><description><![CDATA[
<p>The evtouch Xorg driver was not working because its ABI (Application</p>
<p> Binary Interface) was too old. The new version contains the necessary</p>
<p> ABI updates, so the driver can now work correctly.</p>
]]></description><guid isPermaLink="false">106887</guid><pubDate>Wed, 24 Nov 2010 21:31:54 +0000</pubDate></item><item><title>Advisories  MDVSA-2010:241: gnucash</title><link>https://mandrivausers.org/index.php?/topic/106881-advisories-mdvsa-2010241-gnucash/</link><description><![CDATA[
<p>A vulnerability was discovered and corrected in gnucash:</p>
<p> </p>
<p> gnc-test-env in GnuCash 2.3.15 and earlier places a zero-length</p>
<p> directory name in the LD_LIBRARY_PATH, which allows local users to</p>
<p> gain privileges via a Trojan horse shared library in the current</p>
<p> working directory (CVE-2010-3999).</p>
<p> </p>
<p> The affected /usr/bin/gnc-test-env file has been removed to mitigate</p>
<p> the CVE-2010-3999 vulnerability as gnc-test-env is only used for</p>
<p> tests and while building gnucash.</p>
<p> </p>
<p> Additionally for Mandriva 2010.1 gnucash-2.2.9 was not compatible</p>
<p> with guile. This update adapts gnucash to the new API of guile.</p>
]]></description><guid isPermaLink="false">106881</guid><pubDate>Wed, 24 Nov 2010 18:27:09 +0000</pubDate></item><item><title>Advisories  MDVSA-2010:240: mono</title><link>https://mandrivausers.org/index.php?/topic/106875-advisories-mdvsa-2010240-mono/</link><description><![CDATA[
<p>A vulnerability was discovered and corrected in mono:</p>
<p> </p>
<p> Untrusted search path vulnerability in metadata/loader.c in Mono 2.8</p>
<p> and earlier allows local users to gain privileges via a Trojan horse</p>
<p> shared library in the current working directory (CVE-2010-4159).</p>
<p> </p>
<p> Packages for 2009.0 are provided as of the Extended Maintenance</p>
<p> Program. Please visit this link to learn more:</p>
<p> <a href="http://store.mandriva.com/product_info.php?cPath=149&amp;products_id=490" rel="external nofollow">http://store.mandriva.com/product_info.php?cPath=149&amp;products_id=490</a></p>
<p> </p>
<p> The updated packages have been patched to correct this issue.</p>
]]></description><guid isPermaLink="false">106875</guid><pubDate>Wed, 24 Nov 2010 17:27:52 +0000</pubDate></item><item><title>Advisories  MDVA-2010:230: kolab-webadmin</title><link>https://mandrivausers.org/index.php?/topic/106863-advisories-mdva-2010230-kolab-webadmin/</link><description><![CDATA[
<p>Normal users lacks permission to change their own personal information</p>
<p> on kolab web interface, this update fixes this issue.</p>
]]></description><guid isPermaLink="false">106863</guid><pubDate>Wed, 24 Nov 2010 13:26:55 +0000</pubDate></item></channel></rss>
