Jump to content

paul

Admin
  • Posts

    5611
  • Joined

  • Last visited

  • Days Won

    8

Posts posted by paul

  1. A vulnerabilitiy has been found and corrected in apache:

     

    mod_proxy_ajp: Respond with HTTP_BAD_REQUEST when the body is not

    sent after request headers indicate a request body is incoming;

    this is not a case of HTTP_INTERNAL_SERVER_ERROR (CVE-2010-0408).

     

    Packages for 2008.0 are provided for Corporate Desktop 2008.0

    customers.

     

    The updated packages have been patched to correct this issue.

  2. Rsnapshot will automatically add --exclude=xxxx to the rsync

    options for backups of the filesystem on which the snapshot-root

    is located. This will be added to the rsync command-line AFTER the

    rsync_short_args and rsync_long_args, but BEFORE any backup-specific

    options. This means that the --exclude=xxxx will override whatever

    backup-specific excludes are defined. This can be a problem if the

    name of your snapshot-root is something which is common in many file

    names. This version resolves this problems.

  3. A vulnerabilitiy has been found and corrected in mozilla-thunderbird:

     

    Security researcher Alin Rad Pop of Secunia Research reported that

    the HTML parser incorrectly freed used memory when insufficient space

    was available to process remaining input. Under such circumstances,

    memory occupied by in-use objects was freed and could later be filled

    with attacker-controlled text. These conditions could result in the

    execution or arbitrary code if methods on the freed objects were

    subsequently called (CVE-2009-1571).

     

    Packages for 2008.0 are provided for Corporate Desktop 2008.0

    customers.

     

    The updated packages have been patched to correct this issue.

  4. A vulnerabilitiy has been found and corrected in sudo:

     

    sudo 1.6.x before 1.6.9p21 and 1.7.x before 1.7.2p4, when a

    pseudo-command is enabled, permits a match between the name of the

    pseudo-command and the name of an executable file in an arbitrary

    directory, which allows local users to gain privileges via a crafted

    executable file, as demonstrated by a file named sudoedit in a user's

    home directory (CVE-2010-0426).

     

    Packages for 2008.0 are provided for Corporate Desktop 2008.0

    customers.

     

    The updated packages have been patched to correct this issue.

  5. Updated timezone packages are being provided for older Mandriva Linux

    systems that do not contain new Daylight Savings Time information

    and Time Zone information for some locations. These updated packages

    contain the new information.

     

    Update:

     

    The MDVA-2010:006 advisory did not provide updated timezone packages

    for MNF2, CS4 and 2008.0. This advisory provides the missing packages.

     

    Packages for 2008.0 are provided for Corporate Desktop 2008.0

    customers.

  6. A vulnerability has been found in ncpfs which can be exploited by

    local users to disclose potentially sensitive information, cause a

    DoS (Denial of Service), and potentially gain escalated privileges

    (CVE-2009-3297).

     

    Packages for 2008.0 are provided for Corporate Desktop 2008.0

    customers.

     

    The updated packages have been patched to correct this issue.

×
×
  • Create New...