-
Posts
5611 -
Joined
-
Last visited
-
Days Won
8
Content Type
Profiles
Forums
Events
Posts posted by paul
-
-
Poppler cairo backend was not handling PDF images prescaling
correctly, causing some PDF files (mostly from scanned text) to
be unreadable. This updates fixes this issues and includes other
stability fixes.
-
Updated timezone packages are being provided for older Mandriva Linux
systems that do not contain new Daylight Savings Time information
and Time Zone information for some locations. These updated packages
contain the new information.
-
The RPM packages tag was wrong in the mandriva-release package
released with Mandriva Enterprise Server 5.1. This only affected
packages rebuilt in that system.
This update addresses that issue.
-
The Adobe Flash plugin has https support, but only searches for SSL
certificates in /etc/ssl/certs. This advisory provides a compatibility
symlink at /etc/ssl/certs pointing to /etc/pki/tls/certs to remedy
this problem.
Additionally this advisory also brings the latest root CA certs
from the mozilla cvs dated 2010-02-16. The mozilla nss library has
consequently been rebuilt to pickup these changes and are also being
provided.
Packages for 2008.0 are provided for Corporate Desktop 2008.0
customers.
-
Multiple vulnerabilities has been found and corrected in ncpfs:
sutil/ncpumount.c in ncpumount in ncpfs 2.2.6 produces certain detailed
error messages about the results of privileged file-access attempts,
which allows local users to determine the existence of arbitrary
files via the mountpoint name (CVE-2010-0790).
The (1) ncpmount, (2) ncpumount, and (3) ncplogin programs in ncpfs
2.2.6 do not properly create lock files, which allows local users
to cause a denial of service (application failure) via unspecified
vectors that trigger the creation of a /etc/mtab~ file that persists
after the program exits (CVE-2010-0791).
Packages for 2008.0 are provided for Corporate Desktop 2008.0
customers.
The updated packages have been patched to correct these issues.
-
There was a regression in certain versions of foomatic-rip 3 and 4,
which has since been fixed. As a result, old versions fail the LSB
printing tests.
This advisory updates foomatic-db to 4.0 that passes the LSB tests
and also provides various updated printing softwares and drivers.
-
A vulnerability has been found and corrected in squid:
The htcpHandleTstRequest function in htcp.c in Squid 2.x and 3.0
through 3.0.STABLE23 allows remote attackers to cause a denial of
service (crash) via crafted packets to the HTCP port, which triggers
a NULL pointer dereference (CVE-2010-0639).
Packages for 2008.0 are provided for Corporate Desktop 2008.0
customers.
The updated packages have been patched to correct this issue.
-
A vulnerability has been found and corrected in virtualbox:
Unspecified vulnerability in Guest Additions in Sun xVM VirtualBox
1.6.x and 2.0.x before 2.0.12, 2.1.x, and 2.2.x, and Sun
VirtualBox before 3.0.10, allows guest OS users to cause a denial
of service (memory consumption) on the guest OS via unknown vectors
(CVE-2009-3940).
Packages for 2008.0 are provided for Corporate Desktop 2008.0
customers.
The updated packages have been patched to correct this issue.
-
Multiple vulnerabilities has been found and corrected in php:
* Improved LCG entropy. (Rasmus, Samy Kamkar)
* Fixed safe_mode validation inside tempnam() when the directory
path does not end with a /). (Martin Jansen)
* Fixed a possible open_basedir/safe_mode bypass in the session
extension identified by Grzegorz Stachowiak. (Ilia)
Packages for 2008.0 are provided for Corporate Desktop 2008.0
customers.
The updated packages have been patched to correct these issues.
-
Revert third party integration for now as some issues were discovered.
Update:
The mmc-wizard-1.0-13.10mdvmes5 update packages brought new
unresolved dependancies wich prevented it from installing using
MandrivaUpdate. This advisory resolves this problem by providing the
missing packages.
-
Fix packages signature management when a package is in 2
sub-repositories same version but different signature. This problem
occured when local media were used.
-
A vulnerabilitiy has been found and corrected in apache:
The ap_read_request function in server/protocol.c in the Apache HTTP
Server 2.2.x before 2.2.15, when a multithreaded MPM is used, does
not properly handle headers in subrequests in certain circumstances
involving a parent request that has a body, which might allow remote
attackers to obtain sensitive information via a crafted request that
triggers access to memory locations associated with an earlier request
(CVE-2010-0434).
Packages for 2008.0 are provided for Corporate Desktop 2008.0
customers.
The updated packages have been patched to correct this issue.
-
This update provides the OpenOffice.org 3.0 major version and holds
the security fixes for the following issues:
An integer underflow might allow remote attackers to execute arbitrary
code via crafted records in the document table of a Word document
leading to a heap-based buffer overflow (CVE-2009-0200).
An heap-based buffer overflow might allow remote attackers to execute
arbitrary code via unspecified records in a crafted Word document
related to table parsing. (CVE-2009-0201).
Multiple heap-based buffer overflows allow remote attackers to execute
arbitrary code via a crafted EMF+ file (CVE-2009-2140).
OpenOffice's xmlsec uses a bundled Libtool which might load .la
file in the current working directory allowing local users to gain
privileges via a Trojan horse file. For enabling such vulnerability
xmlsec has to use --enable-crypto_dl building flag however it does
not, although the fix keeps protected against this threat whenever
that flag had been enabled (CVE-2009-3736).
Additional packages are also being provided due to dependencies.
Packages for 2008.0 are provided for Corporate Desktop 2008.0
customers.
-
Add a buildrequire on python-twisted-core to get rid of a file deps
on /usr/bin/twistd
-
An out-of-bounds reading flaw in the JBIG2 decoder allows remote
attackers to cause a denial of service (crash) via a crafted PDF file
(CVE-2009-0799).
Multiple input validation flaws in the JBIG2 decoder allows
remote attackers to execute arbitrary code via a crafted PDF file
(CVE-2009-0800).
An integer overflow in the JBIG2 decoder allows remote attackers to
execute arbitrary code via a crafted PDF file (CVE-2009-1179).
A free of invalid data flaw in the JBIG2 decoder allows remote
attackers to execute arbitrary code via a crafted PDF (CVE-2009-1180).
A NULL pointer dereference flaw in the JBIG2 decoder allows remote
attackers to cause denial of service (crash) via a crafted PDF file
(CVE-2009-1181).
Multiple buffer overflows in the JBIG2 MMR decoder allows remote
attackers to cause denial of service or to execute arbitrary code
via a crafted PDF file (CVE-2009-1182, CVE-2009-1183).
An integer overflow in the JBIG2 decoding feature allows remote
attackers to cause a denial of service (crash) and possibly execute
arbitrary code via vectors related to CairoOutputDev (CVE-2009-1187).
An integer overflow in the JBIG2 decoding feature allows remote
attackers to execute arbitrary code or cause a denial of service
(application crash) via a crafted PDF document (CVE-2009-1188).
Integer overflow in the SplashBitmap::SplashBitmap function in Xpdf 3.x
before 3.02pl4 and Poppler before 0.12.1 might allow remote attackers
to execute arbitrary code via a crafted PDF document that triggers a
heap-based buffer overflow. NOTE: some of these details are obtained
from third party information. NOTE: this issue reportedly exists
because of an incomplete fix for CVE-2009-1188 (CVE-2009-3603).
The Splash::drawImage function in Splash.cc in Xpdf 2.x and 3.x
before 3.02pl4, and Poppler 0.x, as used in GPdf and kdegraphics KPDF,
does not properly allocate memory, which allows remote attackers to
cause a denial of service (application crash) or possibly execute
arbitrary code via a crafted PDF document that triggers a NULL pointer
dereference or a heap-based buffer overflow (CVE-2009-3604).
Multiple integer overflows allow remote attackers to cause a denial
of service (application crash) or possibly execute arbitrary code
via a crafted PDF file, related to (1) glib/poppler-page.cc; (2)
ArthurOutputDev.cc, (3) CairoOutputDev.cc, (4) GfxState.cc, (5)
JBIG2Stream.cc, (6) PSOutputDev.cc, and (7) SplashOutputDev.cc
in poppler/; and (8) SplashBitmap.cc, (9) Splash.cc, and (10)
SplashFTFont.cc in splash/. NOTE: this may overlap CVE-2009-0791
(CVE-2009-3605).
Integer overflow in the PSOutputDev::doImageL1Sep function in Xpdf
before 3.02pl4, and Poppler 0.x, as used in kdegraphics KPDF, might
allow remote attackers to execute arbitrary code via a crafted PDF
document that triggers a heap-based buffer overflow (CVE-2009-3606).
Integer overflow in the create_surface_from_thumbnail_data function
in glib/poppler-page.cc allows remote attackers to cause a denial of
service (memory corruption) or possibly execute arbitrary code via a
crafted PDF document that triggers a heap-based buffer overflow. NOTE:
some of these details are obtained from third party information
(CVE-2009-3607).
Integer overflow in the ObjectStream::ObjectStream function in XRef.cc
in Xpdf 3.x before 3.02pl4 and Poppler before 0.12.1, as used in
GPdf, kdegraphics KPDF, CUPS pdftops, and teTeX, might allow remote
attackers to execute arbitrary code via a crafted PDF document that
triggers a heap-based buffer overflow (CVE-2009-3608).
Integer overflow in the ImageStream::ImageStream function in Stream.cc
in Xpdf before 3.02pl4 and Poppler before 0.12.1, as used in GPdf,
kdegraphics KPDF, and CUPS pdftops, allows remote attackers to
cause a denial of service (application crash) via a crafted PDF
document that triggers a NULL pointer dereference or buffer over-read
(CVE-2009-3609).
Buffer overflow in the ABWOutputDev::endWord function in
poppler/ABWOutputDev.cc as used by the Abiword pdftoabw utility,
allows user-assisted remote attackers to cause a denial of service and
possibly execute arbitrary code via a crafted PDF file (CVE-2009-3938).
This update provides fixes for that vulnerabilities.
-
Revert third party integration for now as some issues were discovered.
-
This update provides lots of bugs fixes and new functionalities for
installation:
- Add pt_BR translation for Advanced and Others stack
- Add NuFW stack
- Open postinstall links in new window
- Add post-installation feature + supplementary text description in
bundle display
- Request my.mandriva.com account validation when media add fails
- Check if media is already configured
- Remember login lang setting with a cookie
-
This update provides the latest version of nufw software suite,
with many bugfixes and usage improvements.
-
Pam_krb5 2.2.14 through 2.3.4 generates different password prompts
depending on whether the user account exists, which allows remote
attackers to enumerate valid usernames (CVE-2009-1384).
This update provides the version 2.3.5 of pam_krb5, which is not
vulnerable to this issue.
-
Remove --update option when adding media on corporate product. This
allows users to add full sources through GUI interface.
-
Yep Ian is correct ;) (except for one little thing)
if you had another network on your lan you would not route via a gateway but via device.
ip route add 192.168.10.0/24 via eth1
*Note: not sure how to do this with route command .. haven't used route for years :D
which is why it "just works" out of the box.
The linux kernel loads the ethernet interface with a network attached to it, and sends a route via device command when the interface comes up.
-
This update adds module preloading to simplify the use of kvm. Proper
module will be loaded only if hardware configuration supports it.
-
Old version of slib was not compatible with some gnucash features,
which could cause crashes in the application. This bugfix update
features latest version of slib package and ensure it is correctly
registering into guile code repository. Additionally improvements was
done for the guile packages which is also provided with this advisory.
-
This bugfix release addresses a long standing problem when issuing
the halt or reboot commands on a remote Mandriva system. This led
to that the session wasn't closed properly. This advisory corrects
this problem.
Advisories MDVA-2010:106: system-config-printer
in Mandriva Security Advisories
Posted
In mandriva 2010.0, there was a missing requires that make impossible
to choose a printer though samba.
Also, in mandriva 2010.0, the cups service couldn't be started if
the user started s-c-p manually.
This update fixes these issues.