-
Content Count
5599 -
Joined
-
Last visited
-
Days Won
6
Posts posted by paul
-
-
Multiple vulnerabilities were discovered and corrected in krb5:
An unauthenticated remote attacker could alter a SAM-2 challenge,
affecting the prompt text seen by the user or the kind of response
sent to the KDC. Under some circumstances, this can negate the
incremental security benefit of using a single-use authentication
mechanism token. An unauthenticated remote attacker has a 1/256
chance of forging KRB-SAFE messages in an application protocol if the
targeted pre-existing session uses an RC4 session key. Few application
protocols use KRB-SAFE messages (CVE-2010-1323).
An unauthenticated remote attacker can forge GSS tokens that
are intended to be integrity-protected but unencrypted, if the
targeted pre-existing application session uses a DES session key. An
authenticated remote attacker can forge PACs if using a KDC that does
not filter client-provided PAC data. This can result in privilege
escalation against a service that relies on PAC contents to make
authorization decisions. An unauthenticated remote attacker has a 1/256
chance of swapping a client-issued KrbFastReq into a different KDC-REQ,
if the armor key is RC4. The consequences are believed to be minor
(CVE-2010-1324).
An authenticated remote attacker that controls a legitimate service
principal has a 1/256 chance of forging the AD-SIGNEDPATH signature
if the TGT key is RC4, allowing it to use self-generated evidence
tickets for S4U2Proxy, instead of tickets obtained from the user or
with S4U2Self. Configurations using RC4 for the TGT key are believed
to be rare. An authenticated remote attacker has a 1/256 chance of
forging AD-KDC-ISSUED signatures on authdata elements in tickets
having an RC4 service key, resulting in privilege escalation against
a service that relies on these signatures. There are no known uses
of the KDC-ISSUED authdata container at this time (CVE-2010-4020.
An authenticated remote attacker that controls a legitimate service
principal could obtain a valid service ticket to itself containing
valid KDC-generated authorization data for a client whose TGS-REQ
it has intercepted. The attacker could then use this ticket for
S4U2Proxy to impersonate the targeted client even if the client never
authenticated to the subverted service. The vulnerable configuration
is believed to be rare (CVE-2010-4021).
The updated packages have been patched to correct this issue.
-
A vulnerability was discovered and corrected in krb5:
An unauthenticated remote attacker could alter a SAM-2 challenge,
affecting the prompt text seen by the user or the kind of response
sent to the KDC. Under some circumstances, this can negate the
incremental security benefit of using a single-use authentication
mechanism token. An unauthenticated remote attacker has a 1/256
chance of forging KRB-SAFE messages in an application protocol if the
targeted pre-existing session uses an RC4 session key. Few application
protocols use KRB-SAFE messages (CVE-2010-1323).
Packages for 2009.0 are provided as of the Extended Maintenance
Program. Please visit this link to learn more:
http://store.mandriva.com/product_info.php?cPath=149&products_id=490
The updated packages have been patched to correct this issue.
-
I'm a big fan of XBMC .. I have one in my lounge .. it's awesome :)
-
A vulnerability has been found and corrected in phpmyadmin:
It was possible to conduct a XSS attack using spoofed request on the
db search script (CVE-2010-4329).
This upgrade provides the latest phpmyadmin versions which is not
vulnerable to this security issue.
-
wow .. quite a hub-bub of activity.
Looks good ... interesting considering the controversial Mageia Linux split, and Russian buy out.
-
A vulnerability was discovered and corrected in libxml2:
libxml2 before 2.7.8 reads from invalid memory locations
during processing of malformed XPath expressions, which allows
context-dependent attackers to cause a denial of service (application
crash) via a crafted XML document (CVE-2010-4008).
Packages for 2009.0 are provided as of the Extended Maintenance
Program. Please visit this link to learn more:
http://store.mandriva.com/product_info.php?cPath=149&products_id=490
The updated packages have been patched to correct these issues.
-
This advisory updates wireshark to the latest version (1.2.13),
fixing one security issue:
Heap-based buffer overflow in the dissect_ldss_transfer function
(epan/dissectors/packet-ldss.c) in the LDSS dissector in Wireshark
1.2.0 through 1.2.12 and 1.4.0 through 1.4.1 allows remote attackers
to cause a denial of service (crash) and possibly execute arbitrary
code via an LDSS packet with a long digest line that triggers memory
corruption (CVE-2010-4300).
-
This is a bugfix and maintenance advisory that upgrades pidgin to the
latest version (2.7.7) that addresses various issues with upstream
service providers (icq, msn).
Packages for 2009.0 are provided as of the Extended Maintenance
Program. Please visit this link to learn more:
http://store.mandriva.com/product_info.php?cPath=149&products_id=490
-
The evtouch Xorg driver was not working because its ABI (Application
Binary Interface) was too old. The new version contains the necessary
ABI updates, so the driver can now work correctly.
-
A vulnerability was discovered and corrected in gnucash:
gnc-test-env in GnuCash 2.3.15 and earlier places a zero-length
directory name in the LD_LIBRARY_PATH, which allows local users to
gain privileges via a Trojan horse shared library in the current
working directory (CVE-2010-3999).
The affected /usr/bin/gnc-test-env file has been removed to mitigate
the CVE-2010-3999 vulnerability as gnc-test-env is only used for
tests and while building gnucash.
Additionally for Mandriva 2010.1 gnucash-2.2.9 was not compatible
with guile. This update adapts gnucash to the new API of guile.
-
A vulnerability was discovered and corrected in mono:
Untrusted search path vulnerability in metadata/loader.c in Mono 2.8
and earlier allows local users to gain privileges via a Trojan horse
shared library in the current working directory (CVE-2010-4159).
Packages for 2009.0 are provided as of the Extended Maintenance
Program. Please visit this link to learn more:
http://store.mandriva.com/product_info.php?cPath=149&products_id=490
The updated packages have been patched to correct this issue.
-
Normal users lacks permission to change their own personal information
on kolab web interface, this update fixes this issue.
-
update bacula version (from 3.0.2 to 3.0.3) and add Bweb interface. Add
the new dependency javascript-libs-extjs (needed for bweb).
-
This is a maintenance and bugfix release of firefox that upgrades
firefox to the 3.6.12 version and adds missing localization packages
for the Georgian, Kurdish, Occitan and Serbian languages.
Packages for 2009.0 are provided as of the Extended Maintenance
Program. Please visit this link to learn more:
http://store.mandriva.com/product_info.php?cPath=149&products_id=490
Additionally, some packages which require so, have been rebuilt and
are being provided as updates.
-
Done :)
ur naow teh adminz
-
I'm in :) does that mean I'm an admin there too? ;)
you poor bastard .. you're a glutton for punishment aren't you?
go register, and I can tick the box to make you admin .. don't say I didn't warn you
-
Since there's no Mageia release out yet, not even a test release, there's nothing really to be in yet if I'm not mistaken. Development takes place on the mailing lists not on the forum.
Btw what was the final conclusion, will they have their own forum or will they use yours?
I know it's been asked before but I can't remember your answer: is it possible to display the mailing lists as forum topics in the new forum?
1. Correct; no release means nothing to support, but it *might* happen :)
2. Final conclusion was: Conversation evaporated, never continued, and whoever is in control of the dns removed forum.mageia.org (or pointed it elsewhere)
3.Not so far; and keep a legible user database, but I'll keep my eye out.
You can count me in Paul. As Dexter11 says there's nowt much to talk about yet.
Dexter and SilverSurfer .. I'm trying to drum up support, been here before (starting a support forum) it takes more than one person; takes a team
-
Right . .who's in?
and what is there to do?
From the founders of other Linux support success stories such as MandrivaUsers.org, Mageia Linux support forum: Mageia Users.
About Mageia Linux
As you may have heard, the future of the Mandriva Linux distribution is unclear.
Most employees working on the distribution were laid off when Edge-IT was liquidated. We do not trust the plans of Mandriva SA anymore and we don't think the company (or any company) is a safe host for such a project.
Many things have happened in the past 12 years. Some were very nice: the Mandriva Linux community is quite large, motivated and experienced, the distribution remains one of the most popular and an award-winning product, easy to use and innovative. Some other events did have some really bad consequences that made people not so confident in the viability of their favourite distribution.
People working on it just do not want to be dependent on the economic fluctuations and erratic, unexplained strategic moves of the company.
For more information from the official Mageia Linux team, visit mageia.org
Paul Willard - mageiausers.org founder.
-
This advisory fixes the gpg keys parsing, which were resulting in
some warnings (bug 61636).
-
A possible double free flaw was found in the imap extension for php
(CVE-2010-4150).
A GC corrupting flaw was found in Zend/zend_gc.c for php-5.3.x that
under certain circumstances could cause a segmention fault (crash).
Packages for 2009.0 are provided as of the Extended Maintenance
Program. Please visit this link to learn more:
http://store.mandriva.com/product_info.php?cPath=149&products_id=490
The updated packages have been patched to correct these issues.
-
This is a bugfix and maintenance update bundle that addresses various
issues in a number of packages.
* Some thread-related problems were found in the libalsa2 library
that could cause segmentation faults in some audio applications (one
example being phonon when used with gstreamer output and accessing
pulseaudio via ALSA plugin). The updated libalsa2 package contains
an upstream fix to correct this problem.
On a related note the PulseAudio package has also been updated to
include several important upstream bugfixes including:
* Much improved handling of capture stream latencies and timing
* Client side XCB implementation to replace Xlib (and thus solve some
thread-related issues).
* Support for the a52 alsa plugin when combined with an appropriate
~/.asoundrc file.
* Several bugs in the pulseaudio plugin for the GStreamer audio
framework could lead to application crashes, for instance in
pidgin. This update contains fixes for memory allocation and lock
handling of the pulseaudio plugin.
-
A possible double free flaw was found in the imap extension for php
(CVE-2010-4150).
A GC corrupting flaw was found in Zend/zend_gc.c for php-5.3.x that
under certain circumstances could case a segmention fault (crash).
Packages for 2009.0 are provided as of the Extended Maintenance
Program. Please visit this link to learn more:
http://store.mandriva.com/product_info.php?cPath=149&products_id=490
The updated packages have been patched to correct these issues.
-
A vulnerability was discovered in openssl that causes a race condition
within the TLS extension parsing code and which can be exploited to
cause a heap-based buffer overflow (CVE-2010-3864).
Packages for 2009.0 are provided as of the Extended Maintenance
Program. Please visit this link to learn more:
http://store.mandriva.com/product_info.php?cPath=149&products_id=490
The updated packages have been patched to correct this issue.
-
A new version of the CGI Perl module has been released to CPAN,
which fixes several security bugs which directly affect Bugzilla
(these two security bugs where first discovered as affecting Bugzilla,
then identified as being bugs in CGI.pm itself).
Packages for 2009.0 are provided as of the Extended Maintenance
Program. Please visit this link to learn more:
http://store.mandriva.com/product_info.php?cPath=149&products_id=490
The updated packages have been upgraded to perl-CGI 3.50 to solve
these security issues.
Advisories MDVA-2010:233: nautilus-sendto
in Mandriva Security Advisories
Posted · Report reply
nautilus-sendto would crash on startup. This update was rebuilt with
the right linking flags corrects the problem.