Jump to content

paul

Admin
  • Posts

    5611
  • Joined

  • Last visited

  • Days Won

    8

Posts posted by paul

  1. A security vulnerability has been identified and fixed in pidgin:

     

    The msn_emoticon_msg function in slp.c in the MSN protocol plugin in

    libpurple in Pidgin before 2.7.0 allows remote attackers to cause

    a denial of service (application crash) via a custom emoticon in a

    malformed SLP message (CVE-2010-1624).

     

    Packages for 2008.0 and 2009.0 are provided due to the Extended

    Maintenance Program for those products.

     

    The updated packages have been patched to correct this issue.

  2. Multiple vulnerabilities has been discovered and fixed in tetex:

     

    Multiple buffer overflows in the JBIG2 decoder in Xpdf 3.02pl2

    and earlier allow remote attackers to cause a denial of service

    (crash) via a crafted PDF file, related to (1) setBitmap and (2)

    readSymbolDictSeg (CVE-2009-0146).

     

    Multiple integer overflows in the JBIG2 decoder in Xpdf 3.02pl2 and

    earlier allow remote attackers to cause a denial of service (crash)

    via a crafted PDF file (CVE-2009-0147).

     

    The JBIG2 decoder in Xpdf 3.02pl2 and earlier allows remote attackers

    to cause a denial of service (crash) via a crafted PDF file that

    triggers a free of uninitialized memory (CVE-2009-0166).

     

    Heap-based buffer overflow in Xpdf 3.02pl2 and earlier, CUPS 1.3.9,

    and probably other products, allows remote attackers to execute

    arbitrary code via a PDF file with crafted JBIG2 symbol dictionary

    segments (CVE-2009-0195).

     

    Buffer overflow in BibTeX 0.99 allows context-dependent attackers to

    cause a denial of service (memory corruption and crash) via a long

    .bib bibliography file (CVE-2009-1284).

     

    Integer overflow in the ObjectStream::ObjectStream function in XRef.cc

    in Xpdf 3.x before 3.02pl4 and Poppler before 0.12.1, as used in

    GPdf, kdegraphics KPDF, CUPS pdftops, and teTeX, might allow remote

    attackers to execute arbitrary code via a crafted PDF document that

    triggers a heap-based buffer overflow (CVE-2009-3608).

     

    Integer overflow in dvips in TeX Live 2009 and earlier, and teTeX,

    allows remote attackers to cause a denial of service (application

    crash) or possibly execute arbitrary code via a crafted virtual font

    (VF) file associated with a DVI file (CVE-2010-0827).

     

    Multiple array index errors in set.c in dvipng 1.11 and 1.12, and

    teTeX, allow remote attackers to cause a denial of service (application

    crash) or possibly execute arbitrary code via a malformed DVI file

    (CVE-2010-0829).

     

    Integer overflow in the predospecial function in dospecial.c in

    dvips in (1) TeX Live and (2) teTeX might allow user-assisted remote

    attackers to execute arbitrary code via a crafted DVI file that

    triggers a heap-based buffer overflow. NOTE: some of these details

    are obtained from third party information (CVE-2010-0739).

     

    Multiple integer overflows in dvipsk/dospecial.c in dvips in TeX Live

    2009 and earlier, and teTeX, allow remote attackers to cause a denial

    of service (application crash) or possibly execute arbitrary code via

    a special command in a DVI file, related to the (1) predospecial and

    (2) bbdospecial functions, a different vulnerability than CVE-2010-0739

    (CVE-2010-1440).

     

    The corrected packages solves these problems.

  3. This update fixes a number of issues in msec:

    - this update fixes incorrect German localization for msecperms

    messages (bug #51005)

    - this update allows to import legacy perm.local permissions

    configuration file, which could be installed by third-party

    applications

    - this update fixes a crash when pam_unix is used together with msec

    (bug #58018). Note that this configuration is not used by Mandriva

    Linux usually, but can be employed in some custom environments.

    - this update adds a IGNORE_PID_CHANGES variable to filter changes

    in process PIDs when reporting changes in network configuration (bug

    #56744). To use this functionality, add a IGNORE_PID_CHANGES=yes into

    /etc/security/msec/security.conf, and changes in listening network

    ports will be ignored during periodic checks.

    - this update fixes an issue when chkrootkit results were not properly

    excluded by the exceptions list (bug #58076)

  4. Multiple vulnerabilities has been discovered and fixed in tetex:

     

    Buffer overflow in BibTeX 0.99 allows context-dependent attackers to

    cause a denial of service (memory corruption and crash) via a long

    .bib bibliography file (CVE-2009-1284).

     

    Integer overflow in the ObjectStream::ObjectStream function in XRef.cc

    in Xpdf 3.x before 3.02pl4 and Poppler before 0.12.1, as used in

    GPdf, kdegraphics KPDF, CUPS pdftops, and teTeX, might allow remote

    attackers to execute arbitrary code via a crafted PDF document that

    triggers a heap-based buffer overflow (CVE-2009-3608).

     

    Integer overflow in dvips in TeX Live 2009 and earlier, and teTeX,

    allows remote attackers to cause a denial of service (application

    crash) or possibly execute arbitrary code via a crafted virtual font

    (VF) file associated with a DVI file (CVE-2010-0827).

     

    Multiple array index errors in set.c in dvipng 1.11 and 1.12, and

    teTeX, allow remote attackers to cause a denial of service (application

    crash) or possibly execute arbitrary code via a malformed DVI file

    (CVE-2010-0829).

     

    Integer overflow in the predospecial function in dospecial.c in

    dvips in (1) TeX Live and (2) teTeX might allow user-assisted remote

    attackers to execute arbitrary code via a crafted DVI file that

    triggers a heap-based buffer overflow. NOTE: some of these details

    are obtained from third party information (CVE-2010-0739).

     

    Multiple integer overflows in dvipsk/dospecial.c in dvips in TeX Live

    2009 and earlier, and teTeX, allow remote attackers to cause a denial

    of service (application crash) or possibly execute arbitrary code via

    a special command in a DVI file, related to the (1) predospecial and

    (2) bbdospecial functions, a different vulnerability than CVE-2010-0739

    (CVE-2010-1440).

     

    Packages for 2008.0 and 2009.0 are provided due to the Extended

    Maintenance Program for those products.

     

    The corrected packages solves these problems.

  5. Multiple vulnerabilies has been found and corrected in samba:

     

    client/mount.cifs.c in mount.cifs in smbfs in Samba does not verify

    that the (1) device name and (2) mountpoint strings are composed of

    valid characters, which allows local users to cause a denial of service

    (mtab corruption) via a crafted string (CVE-2010-0547).

     

    client/mount.cifs.c in mount.cifs in smbfs in Samba allows local users

    to mount a CIFS share on an arbitrary mountpoint, and gain privileges,

    via a symlink attack on the mountpoint directory file (CVE-2010-0787).

     

    The updated packages have been patched to correct these issues.

     

    Update:

     

    It was discovered that the previous Samba update required libtalloc

    from Samba4 package. Therefore, this update provides the required

    packages in order to fix the issue.

  6. A vulnerability was discovered in mysql which would permit mysql users

    without any kind of privileges to use the UNINSTALL PLUGIN function

    (CVE-2010-1621).

     

    A problem was discovered in the mysqld init script which under certain

    circumstances could cause the service to exit too quickly, giving the [

    OK ] status and before the mysql server was really started and bound

    to the mysql socket or IP address. This caused a problem for products

    like Pulse2.

     

    The corrected packages solves these problems.

  7. A vulnerability was discovered in mysql which would permit mysql users

    without any kind of privileges to use the UNINSTALL PLUGIN function.

     

    A problem was discovered in the mysqld init script which under certain

    circumstances could cause the service to exit too quickly, giving the [

    OK ] status and before the mysql server was really started and bound

    to the mysql socket or IP address. This caused a problem for products

    like Pulse2.

     

    The corrected packages solves these problems.

  8. A problem was discovered in the mysqld init script which under certain

    circumstances could cause the service to exit too quickly, giving the [

    OK ] status and before the mysql server was really started and bound

    to the mysql socket or IP address. This caused a problem for products

    like Pulse2. The corrected packages solves this problem.

     

    Packages for 2008.0 and 2009.0 are provided due to the Extended

    Maintenance Program for those products.

  9. A vulnerability has been found and corrected in cacti:

     

    SQL injection vulnerability in templates_export.php in Cacti 0.8.7e

    and earlier allows remote attackers to execute arbitrary SQL commands

    via the export_item_id parameter (CVE-2010-1431).

     

    Additionally cacti has been upgraded to 0.8.7e for Corporate Server 4.

     

    The updated packages have been patched to correct this issue.

  10. Multiple vulnerabilies has been found and corrected in samba:

     

    client/mount.cifs.c in mount.cifs in smbfs in Samba does not verify

    that the (1) device name and (2) mountpoint strings are composed of

    valid characters, which allows local users to cause a denial of service

    (mtab corruption) via a crafted string (CVE-2010-0547).

     

    client/mount.cifs.c in mount.cifs in smbfs in Samba allows local users

    to mount a CIFS share on an arbitrary mountpoint, and gain privileges,

    via a symlink attack on the mountpoint directory file (CVE-2010-0787).

     

    The updated packages have been patched to correct these issues.

  11. This updates provides a new OpenOffice.org version 3.1.1. It holds

    security and bug fixes described as follow:

     

    An integer underflow might allow remote attackers to execute arbitrary

    code via crafted records in the document table of a Word document,

    leading to a heap-based buffer overflow (CVE-2009-0200).

     

    A heap-based buffer overflow might allow remote attackers to execute

    arbitrary code via unspecified records in a crafted Word document,

    related to table parsing (CVE-2009-0201).

     

    A heap-based buffer overflow allows remote attackers to execute

    arbitrary code via a crafted EMF file (CVE-2009-2139).

     

    Multiple heap-based buffer overflows allow remote attackers to execute

    arbitrary code via a crafted EMF+ file (CVE-2009-2140).

     

    OpenOffice's xmlsec uses a bundled Libtool which might load .la

    file in the current working directory allowing local users to gain

    privileges via a Trojan horse file. For enabling such vulnerability

    xmlsec has to use --enable-crypto_dl building flag however it does

    not, although the fix keeps protected against this threat whenever

    that flag had been enabled (CVE-2009-3736).

     

    Addittionaly this update provides following bug fixes:

     

    OpenOffice.org is not properly configure to use the xdg-email

    functionality of the FreeDesktop standard (#52195).

     

    Template desktop icons are not properly set up then they are not

    presented under the context menu of applications like Dolphin (#56439).

     

    libia_ora-gnome is added as suggest as long as that package is needed

    for a better look (#57385#c28).

     

    It is enabled a fallback logic to properly select an OpenOffice.org

    style whenever one is set up but that is not installed (#57530#c1,

    #53284, #45133, #39043)

     

    It is enabled the Firefox plugin for viewing OpenOffice.org documents

    inside browser.

     

    Further packages were provided to supply OpenOffice.org. 3.1.1

    dependencies.

  12. Multiple vulnerabilies has been found and corrected in samba:

     

    client/mount.cifs.c in mount.cifs in smbfs in Samba does not verify

    that the (1) device name and (2) mountpoint strings are composed of

    valid characters, which allows local users to cause a denial of service

    (mtab corruption) via a crafted string (CVE-2010-0547).

     

    client/mount.cifs.c in mount.cifs in smbfs in Samba allows local users

    to mount a CIFS share on an arbitrary mountpoint, and gain privileges,

    via a symlink attack on the mountpoint directory file (CVE-2010-0747).

     

    The updated packages have been patched to correct these issues.

  13. Multiple vulnerabilities has been found and corrected in gnutls:

     

    The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as

    used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl

    in the Apache HTTP Server 2.2.14 and earlier, OpenSSL before 0.9.8l,

    GnuTLS 2.8.5 and earlier, Mozilla Network Security Services (NSS)

    3.12.4 and earlier, and other products, does not properly associate

    renegotiation handshakes with an existing connection, which allows

    man-in-the-middle attackers to insert data into HTTPS sessions,

    and possibly other types of sessions protected by TLS or SSL, by

    sending an unauthenticated request that is processed retroactively

    by a server in a post-renegotiation context, related to a plaintext

    injection attack, aka the Project Mogul issue (CVE-2009-3555).

     

    The gnutls_x509_crt_get_serial function in the GnuTLS library before

    1.2.1, when running on big-endian, 64-bit platforms, calls the

    asn1_read_value with a pointer to the wrong data type and the wrong

    length value, which allows remote attackers to bypass the certificate

    revocation list (CRL) check and cause a stack-based buffer overflow

    via a crafted X.509 certificate, related to extraction of a serial

    number (CVE-2010-0731).

     

    The updated packages have been patched to correct these issues.

  14. Some vulnerabilities were discovered and corrected in the Linux

    2.6 kernel:

     

    The ATI Rage 128 (aka r128) driver in the Linux kernel before

    2.6.31-git11 does not properly verify Concurrent Command Engine (CCE)

    state initialization, which allows local users to cause a denial of

    service (NULL pointer dereference and system crash) or possibly gain

    privileges via unspecified ioctl calls. (CVE-2009-3620)

     

    fs/namei.c in Linux kernel 2.6.18 through 2.6.34 does not always

    follow NFS automount symlinks, which allows attackers to have an

    unknown impact, related to LOOKUP_FOLLOW. (CVE-2010-1088)

     

    The wake_futex_pi function in kernel/futex.c in the Linux kernel

    before 2.6.33-rc7 does not properly handle certain unlock operations

    for a Priority Inheritance (PI) futex, which allows local users to

    cause a denial of service (OOPS) and possibly have unspecified other

    impact via vectors involving modification of the futex value from

    user space. (CVE-2010-0622)

     

    drivers/connector/connector.c in the Linux kernel before 2.6.32.8

    allows local users to cause a denial of service (memory consumption

    and system crash) by sending the kernel many NETLINK_CONNECTOR

    messages. (CVE-2010-0410)

     

    The futex_lock_pi function in kernel/futex.c in the Linux kernel before

    2.6.33-rc7 does not properly manage a certain reference count, which

    allows local users to cause a denial of service (OOPS) via vectors

    involving an unmount of an ext3 filesystem. (CVE-2010-0623)

     

    Aditionally, the kernel was updated to the 2.6.31.13 stable release,

    it was added support for Cirrus Logic CS420x HDA codec, Wacom driver

    was updated to version 0.8.5-12 and there is a fix in the driver for

    backlight on Eee PC 1201HA.

     

    To update your kernel, please follow the directions located at:

     

    http://www.mandriva.com/en/security/kernelupdate

×
×
  • Create New...