Jump to content

aru

Members
  • Posts

    2022
  • Joined

  • Last visited

Everything posted by aru

  1. Mandriva Advisories MDKSA-2005:231 : ffmpeg Updated ffmpeg packages fix buffer overflow vulnerability December 14th, 2005 Simon Kilvington discovered a vulnerability in FFmpeg libavcodec, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise a user's system. The vulnerability is caused due to a boundary error in the "avcodec_default_get_buffer()" function of "utils.c" in libavcodec. This can be exploited to cause a heap-based buffer overflow when a specially-crafted 1x1 ".png" file containing a palette is read. The updated packages have been patched to prevent this problem. The released versions of Mandriva GNU/Linux affected are: CS3.0 2006.0 Full information about this advisory, including the updated packages, is available at: wwwnew.mandriva.com/security/advisories?name=MDKSA-2005:231 Other references: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4048 Posted automatically by aru (mdksec2mub v: mdksec2mub,v 0.15 2005/11/24 16:53:12 aru Exp aru $)
  2. Mandriva Advisories MDKSA-2005:230 : mplayer Updated mplayer packages fix buffer overflow vulnerability December 14th, 2005 Simon Kilvington discovered a vulnerability in FFmpeg libavcodec, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise a user's system. The vulnerability is caused due to a boundary error in the "avcodec_default_get_buffer()" function of "utils.c" in libavcodec. This can be exploited to cause a heap-based buffer overflow when a specially-crafted 1x1 ".png" file containing a palette is read. Mplayer is built with a private copy of ffmpeg containing this same code. The updated packages have been patched to prevent this problem. The released versions of Mandriva GNU/Linux affected are: CS3.0 2006.0 Full information about this advisory, including the updated packages, is available at: wwwnew.mandriva.com/security/advisories?name=MDKSA-2005:230 Other references: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4048 Posted automatically by aru (mdksec2mub v: mdksec2mub,v 0.15 2005/11/24 16:53:12 aru Exp aru $)
  3. Mandriva Advisories MDKSA-2005:229 : xmovie Updated xmovie packages fix buffer overflow vulnerability December 14th, 2005 Simon Kilvington discovered a vulnerability in FFmpeg libavcodec, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise a user's system. The vulnerability is caused due to a boundary error in the "avcodec_default_get_buffer()" function of "utils.c" in libavcodec. This can be exploited to cause a heap-based buffer overflow when a specially-crafted 1x1 ".png" file containing a palette is read. Xmovie is built with a private copy of ffmpeg containing this same code. The updated packages have been patched to prevent this problem. The released versions of Mandriva GNU/Linux affected are: CS3.0 2006.0 Full information about this advisory, including the updated packages, is available at: wwwnew.mandriva.com/security/advisories?name=MDKSA-2005:229 Other references: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4048 Posted automatically by aru (mdksec2mub v: mdksec2mub,v 0.15 2005/11/24 16:53:12 aru Exp aru $)
  4. Mandriva Advisories MDKSA-2005:228 : xine-lib Updated xine-lib packages fix buffer overflow vulnerability December 14th, 2005 Simon Kilvington discovered a vulnerability in FFmpeg libavcodec, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially to compromise a user's system. The vulnerability is caused due to a boundary error in the "avcodec_default_get_buffer()" function of "utils.c" in libavcodec. This can be exploited to cause a heap-based buffer overflow when a specially-crafted 1x1 ".png" file containing a palette is read. Xine-lib is built with a private copy of ffmpeg containing this same code. (Corporate Server 2.1 is not vulnerable) The updated packages have been patched to prevent this problem. The released versions of Mandriva GNU/Linux affected are: CS3.0 2006.0 Full information about this advisory, including the updated packages, is available at: wwwnew.mandriva.com/security/advisories?name=MDKSA-2005:228 Other references: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4048 Posted automatically by aru (mdksec2mub v: mdksec2mub,v 0.15 2005/11/24 16:53:12 aru Exp aru $)
  5. Mandriva Advisories MDKSA-2005:227 : ethereal Updated ethereal packages fix vulnerability December 14th, 2005 A stack-based buffer overflow was discovered in the OSPF dissector in Ethereal.This could potentially be abused to allow remote attackers to execute arbitrary code via crafted packets. The updated packages have been patched to prevent this problem. The released versions of Mandriva GNU/Linux affected are: 2006.0 Full information about this advisory, including the updated packages, is available at: wwwnew.mandriva.com/security/advisories?name=MDKSA-2005:227 Other references: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3651 Posted automatically by aru (mdksec2mub v: mdksec2mub,v 0.15 2005/11/24 16:53:12 aru Exp aru $)
  6. Mandriva Advisories MDKSA-2005:226 : mozilla-thunderbird Updated mozilla-thunderbird package fix vulnerability in enigmail December 12th, 2005 A bug in enigmail, the GPG support extension for Mozilla MailNews and Mozilla Thunderbird was discovered that could lead to the encryption of an email with the wrong public key.This could potentially disclose confidential data to unintended recipients. The updated packages have been patched to prevent this problem. The released versions of Mandriva GNU/Linux affected are: CS3.0 2006.0 Full information about this advisory, including the updated packages, is available at: wwwnew.mandriva.com/security/advisories?name=MDKSA-2005:226 Other references: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3256 Posted automatically by aru (mdksec2mub v: mdksec2mub,v 0.15 2005/11/24 16:53:12 aru Exp aru $)
  7. Mandriva Advisories : AdvisorySynopsis Package name XFree86 Date September 13th, 2005 Advisory ID MDKSA-2005:164 Affected versions 10.0, 10.1, CS2.1, CS3.0, 10.2 Synopsis Updated XFree86/x.org packages fix vulnerability Problem Description A vulnerability was discovered in the pixmap allocation handling of the X server that can lead to local privilege escalation. By allocating a huge pixmap, a local user could trigger an integer overflow that resulted in a memory allocation that was too small for the requested pixmap, leading to a buffer overflow which could then be exploited to execute arbitrary code with full root privileges. The updated packages have been patched to address these issues. Updated Packages Mandrakelinux 10.0 a22ae2b3b2cc019d7769a29fb8d15104 10.0/RPMS/libxfree86-4.3-32.5.100mdk.i586.rpm d13d37d18a49addab3b0a2d0531499da 10.0/RPMS/libxfree86-devel-4.3-32.5.100mdk.i586.rpm 09b8bbc447d39afb1cd67ca808c3c409 10.0/RPMS/libxfree86-static-devel-4.3-32.5.100mdk.i586.rpm 739c0d36b7de1927718087e6b58107a3 10.0/RPMS/X11R6-contrib-4.3-32.5.100mdk.i586.rpm 8fbce53ac64d76dd1f3c01c1697a37f7 10.0/RPMS/XFree86-100dpi-fonts-4.3-32.5.100mdk.i586.rpm 78cf969cbde32f3f5313641abd8b7ed3 10.0/RPMS/XFree86-4.3-32.5.100mdk.i586.rpm 67df382dc676411f83d7fd84247a364c 10.0/RPMS/XFree86-75dpi-fonts-4.3-32.5.100mdk.i586.rpm 1e6a52d9e6306353346ef7e58a384435 10.0/RPMS/XFree86-Xnest-4.3-32.5.100mdk.i586.rpm b0f741bc952ac441492763a4b8cecb69 10.0/RPMS/XFree86-Xvfb-4.3-32.5.100mdk.i586.rpm 2685c443e51305df8a28237c36f490ea 10.0/RPMS/XFree86-cyrillic-fonts-4.3-32.5.100mdk.i586.rpm 891032e89f8ec2e2baff618bf2fdccec 10.0/RPMS/XFree86-doc-4.3-32.5.100mdk.i586.rpm cfb386e03ef9eb60433d2be8a6be4ee8 10.0/RPMS/XFree86-glide-module-4.3-32.5.100mdk.i586.rpm 02c519d9343430bfaa14bdbda1dbb411 10.0/RPMS/XFree86-server-4.3-32.5.100mdk.i586.rpm 68e83de50f74feb64e9d0f1d6cc13193 10.0/RPMS/XFree86-xfs-4.3-32.5.100mdk.i586.rpm 2f110fdfb446ef848b3159d6c8770a9a 10.0/SRPMS/XFree86-4.3-32.5.100mdk.src.rpm Mandrakelinux 10.0/AMD64 4b3c1ebb89306a3c48e003d527ee200d amd64/10.0/RPMS/lib64xfree86-4.3-32.5.100mdk.amd64.rpm c843e848d1ed72f368c2d7f9506313d5 amd64/10.0/RPMS/lib64xfree86-devel-4.3-32.5.100mdk.amd64.rpm 4875f717fb6a7f8fdf2734cf290db8f5 amd64/10.0/RPMS/lib64xfree86-static-devel-4.3-32.5.100mdk.amd64.rpm a22ae2b3b2cc019d7769a29fb8d15104 amd64/10.0/RPMS/libxfree86-4.3-32.5.100mdk.i586.rpm eb3f8d0b8088d2253fd2949cf6fb1914 amd64/10.0/RPMS/X11R6-contrib-4.3-32.5.100mdk.amd64.rpm 16d6c2a5ccbcad6183c8218f80d673ad amd64/10.0/RPMS/XFree86-100dpi-fonts-4.3-32.5.100mdk.amd64.rpm 67107bf55a1f7851008606c4b022c48e amd64/10.0/RPMS/XFree86-4.3-32.5.100mdk.amd64.rpm 771712bf95417d2f913eedb4700625d1 amd64/10.0/RPMS/XFree86-75dpi-fonts-4.3-32.5.100mdk.amd64.rpm 7ad00c0c93239c5b7ec835bda650f827 amd64/10.0/RPMS/XFree86-Xnest-4.3-32.5.100mdk.amd64.rpm afe949ef1fc2e79083037ab3dbc2543e amd64/10.0/RPMS/XFree86-Xvfb-4.3-32.5.100mdk.amd64.rpm 74fe125ebe35ced5dd329ba6c5a637c0 amd64/10.0/RPMS/XFree86-cyrillic-fonts-4.3-32.5.100mdk.amd64.rpm 6b7c5527bc595762541fa6527eb2f1e4 amd64/10.0/RPMS/XFree86-doc-4.3-32.5.100mdk.amd64.rpm 9476c3868994219294259c48f98027b6 amd64/10.0/RPMS/XFree86-server-4.3-32.5.100mdk.amd64.rpm c432435347af9b63e728e0e1f00c5438 amd64/10.0/RPMS/XFree86-xfs-4.3-32.5.100mdk.amd64.rpm 2f110fdfb446ef848b3159d6c8770a9a amd64/10.0/SRPMS/XFree86-4.3-32.5.100mdk.src.rpm Mandrakelinux 10.1 2aac21fad39987730533a07316bf88f5 10.1/RPMS/libxorg-x11-6.7.0-4.4.101mdk.i586.rpm 57c7af1d456ef5932ef6cb0de95e5a00 10.1/RPMS/libxorg-x11-devel-6.7.0-4.4.101mdk.i586.rpm f4c68ab7108542f02b4c66333616616d 10.1/RPMS/libxorg-x11-static-devel-6.7.0-4.4.101mdk.i586.rpm acef69243ba0b4320207766f92690a07 10.1/RPMS/X11R6-contrib-6.7.0-4.4.101mdk.i586.rpm ff9ae80c2ab83926329822b9394f1e7f 10.1/RPMS/xorg-x11-100dpi-fonts-6.7.0-4.4.101mdk.i586.rpm c411dff6a8963084030a3cd309655773 10.1/RPMS/xorg-x11-6.7.0-4.4.101mdk.i586.rpm c00c5c06a9e52395ad1948a925d79ed1 10.1/RPMS/xorg-x11-75dpi-fonts-6.7.0-4.4.101mdk.i586.rpm 049ec56d1ce04fe29bfb137b3293dc80 10.1/RPMS/xorg-x11-Xnest-6.7.0-4.4.101mdk.i586.rpm c22b5c98defda90b2d7c179482432b78 10.1/RPMS/xorg-x11-Xvfb-6.7.0-4.4.101mdk.i586.rpm 161aee877761f825e516ca9c880f3e12 10.1/RPMS/xorg-x11-cyrillic-fonts-6.7.0-4.4.101mdk.i586.rpm ed99959391e000ba4387f23dee57e863 10.1/RPMS/xorg-x11-doc-6.7.0-4.4.101mdk.i586.rpm 9bfd9722d7d0ba4653c95b2f1bac769b 10.1/RPMS/xorg-x11-glide-module-6.7.0-4.4.101mdk.i586.rpm 5084ded6a9b74ae8ad2702c099300309 10.1/RPMS/xorg-x11-server-6.7.0-4.4.101mdk.i586.rpm 4dda0f6f0fede2a59a073827865a603f 10.1/RPMS/xorg-x11-xfs-6.7.0-4.4.101mdk.i586.rpm 5078cac6feb74e7d76d6cc243035e3ce 10.1/SRPMS/xorg-x11-6.7.0-4.4.101mdk.src.rpm Mandrakelinux 10.1/X86_64 c489e2cccd31fc6976e9befb3b22d747 x86_64/10.1/RPMS/lib64xorg-x11-6.7.0-4.4.101mdk.x86_64.rpm 9536028a29921769f5f6a61cb2e995bb x86_64/10.1/RPMS/lib64xorg-x11-devel-6.7.0-4.4.101mdk.x86_64.rpm 8c69ec6fbc31883a623bcb978c3f3530 x86_64/10.1/RPMS/lib64xorg-x11-static-devel-6.7.0-4.4.101mdk.x86_64.rpm 2aac21fad39987730533a07316bf88f5 x86_64/10.1/RPMS/libxorg-x11-6.7.0-4.4.101mdk.i586.rpm 57c7af1d456ef5932ef6cb0de95e5a00 x86_64/10.1/RPMS/libxorg-x11-devel-6.7.0-4.4.101mdk.i586.rpm 6f9e40dceecee7f0d96eb5066286561e x86_64/10.1/RPMS/X11R6-contrib-6.7.0-4.4.101mdk.x86_64.rpm 585db9baf5786ffb22903aa48fa2c924 x86_64/10.1/RPMS/xorg-x11-100dpi-fonts-6.7.0-4.4.101mdk.x86_64.rpm 5db0d26feaff5c4eb4fdf1a94d20295c x86_64/10.1/RPMS/xorg-x11-6.7.0-4.4.101mdk.x86_64.rpm 4ac99044b8b987496adc8ad172a6e3bc x86_64/10.1/RPMS/xorg-x11-75dpi-fonts-6.7.0-4.4.101mdk.x86_64.rpm 4d4543dfd8c1e1c8f89ca070721c4f64 x86_64/10.1/RPMS/xorg-x11-Xnest-6.7.0-4.4.101mdk.x86_64.rpm 20cadee86fdd36d9c2f6eb04f5f31b0c x86_64/10.1/RPMS/xorg-x11-Xvfb-6.7.0-4.4.101mdk.x86_64.rpm adec9be37b01124992365db87432e9c6 x86_64/10.1/RPMS/xorg-x11-cyrillic-fonts-6.7.0-4.4.101mdk.x86_64.rpm dffe6ca2408e299e3c3fa21a3b4bb574 x86_64/10.1/RPMS/xorg-x11-doc-6.7.0-4.4.101mdk.x86_64.rpm 0d81596b6943aee9db34318fb7fb437c x86_64/10.1/RPMS/xorg-x11-server-6.7.0-4.4.101mdk.x86_64.rpm cde21e9bba4cecddc21af89c29ecf107 x86_64/10.1/RPMS/xorg-x11-xfs-6.7.0-4.4.101mdk.x86_64.rpm 5078cac6feb74e7d76d6cc243035e3ce x86_64/10.1/SRPMS/xorg-x11-6.7.0-4.4.101mdk.src.rpm Corporate Server 2.1 600401daac22de3d6ca8343afaa76f8d corporate/2.1/RPMS/X11R6-contrib-4.2.1-6.13.C21mdk.i586.rpm 043bcad2f5ed729b8ab2f49d8bd73284 corporate/2.1/RPMS/XFree86-100dpi-fonts-4.2.1-6.13.C21mdk.i586.rpm 1f2dddc3a61d85bb7d7e05b18e0716b8 corporate/2.1/RPMS/XFree86-4.2.1-6.13.C21mdk.i586.rpm efd013c05c6414b3dc5283213ef8ac98 corporate/2.1/RPMS/XFree86-75dpi-fonts-4.2.1-6.13.C21mdk.i586.rpm 0f683115c2a2791e7ea5dd28efb72097 corporate/2.1/RPMS/XFree86-Xnest-4.2.1-6.13.C21mdk.i586.rpm 3c20c00a9bda51e0c5a6111a543b8640 corporate/2.1/RPMS/XFree86-Xvfb-4.2.1-6.13.C21mdk.i586.rpm a09b96763780f0c6b309a2deea0f0a2d corporate/2.1/RPMS/XFree86-cyrillic-fonts-4.2.1-6.13.C21mdk.i586.rpm c8911aa72a13929b3429942380483049 corporate/2.1/RPMS/XFree86-devel-4.2.1-6.13.C21mdk.i586.rpm 9134a844d0ce59f63dd11a5637a753d6 corporate/2.1/RPMS/XFree86-doc-4.2.1-6.13.C21mdk.i586.rpm e866d11d52bfc5959c38b3f2b344d429 corporate/2.1/RPMS/XFree86-glide-module-4.2.1-6.13.C21mdk.i586.rpm 7a9a196eee63860e9f0b3e37b93d0d2a corporate/2.1/RPMS/XFree86-libs-4.2.1-6.13.C21mdk.i586.rpm 3bb572d57df026ee020216a414cc306d corporate/2.1/RPMS/XFree86-server-4.2.1-6.13.C21mdk.i586.rpm 552263fbbab22388b02e618ad9ec612b corporate/2.1/RPMS/XFree86-static-libs-4.2.1-6.13.C21mdk.i586.rpm 750de79515c6e8ef1c82c57847a816fd corporate/2.1/RPMS/XFree86-xfs-4.2.1-6.13.C21mdk.i586.rpm 1e09c57877163139f17fa3f467a9b28f corporate/2.1/SRPMS/XFree86-4.2.1-6.13.C21mdk.src.rpm Corporate Server 2.1/X86_64 657e8f369a3f88850944cc08e37be30f x86_64/corporate/2.1/RPMS/X11R6-contrib-4.2.1-6.13.C21mdk.x86_64.rpm 0240e1d95008f6c154842ec73a9f6e4f x86_64/corporate/2.1/RPMS/XFree86-100dpi-fonts-4.2.1-6.13.C21mdk.x86_64.rpm 2fce768e58963fd8adec9177cb113f50 x86_64/corporate/2.1/RPMS/XFree86-4.2.1-6.13.C21mdk.x86_64.rpm 86e520d9ec6a91f43c433b9043a7a66c x86_64/corporate/2.1/RPMS/XFree86-75dpi-fonts-4.2.1-6.13.C21mdk.x86_64.rpm fdf18c0aab799d7e7a67b6e2b639a8df x86_64/corporate/2.1/RPMS/XFree86-Xnest-4.2.1-6.13.C21mdk.x86_64.rpm 52935243d695ffd155e1300025cecf28 x86_64/corporate/2.1/RPMS/XFree86-Xvfb-4.2.1-6.13.C21mdk.x86_64.rpm 4aedc5ca09479356a11160029ddbae8c x86_64/corporate/2.1/RPMS/XFree86-cyrillic-fonts-4.2.1-6.13.C21mdk.x86_64.rpm 4bf9d7fcf47f79713285506890ccb5fa x86_64/corporate/2.1/RPMS/XFree86-devel-4.2.1-6.13.C21mdk.x86_64.rpm 63db84cb47efbb2edc29bef548c286c6 x86_64/corporate/2.1/RPMS/XFree86-doc-4.2.1-6.13.C21mdk.x86_64.rpm 71513145dfafcd1d56a219d3f551d309 x86_64/corporate/2.1/RPMS/XFree86-libs-4.2.1-6.13.C21mdk.x86_64.rpm 0a4287f2dd43be122f9d021efd583001 x86_64/corporate/2.1/RPMS/XFree86-server-4.2.1-6.13.C21mdk.x86_64.rpm d43412e0f7d4d38cb529f5b1adeaa10d x86_64/corporate/2.1/RPMS/XFree86-static-libs-4.2.1-6.13.C21mdk.x86_64.rpm 9ed90e39cf0455bc8bf8a7f24b21b609 x86_64/corporate/2.1/RPMS/XFree86-xfs-4.2.1-6.13.C21mdk.x86_64.rpm 1e09c57877163139f17fa3f467a9b28f x86_64/corporate/2.1/SRPMS/XFree86-4.2.1-6.13.C21mdk.src.rpm Corporate Server 3.0 79a7198a580493942ec454194b9df3dc corporate/3.0/RPMS/libxfree86-4.3-32.5.C30mdk.i586.rpm d6ec04347f6464797496c3da73cdcda4 corporate/3.0/RPMS/X11R6-contrib-4.3-32.5.C30mdk.i586.rpm d8fce2a70c1a077f11e9a2459e50d035 corporate/3.0/RPMS/XFree86-100dpi-fonts-4.3-32.5.C30mdk.i586.rpm e1950e466edf84dcf14f9c4a6a13c61e corporate/3.0/RPMS/XFree86-4.3-32.5.C30mdk.i586.rpm 846e7d2a91f63a2ac96cbb3bfa3926b9 corporate/3.0/RPMS/XFree86-75dpi-fonts-4.3-32.5.C30mdk.i586.rpm e2d9916b293c1f85cf42089d7e091cb7 corporate/3.0/RPMS/XFree86-Xnest-4.3-32.5.C30mdk.i586.rpm 49b8b9cb4ac554dc82da96145557f5a6 corporate/3.0/RPMS/XFree86-Xvfb-4.3-32.5.C30mdk.i586.rpm e7c82bf72a589488786ae7384bcf00e4 corporate/3.0/RPMS/XFree86-glide-module-4.3-32.5.C30mdk.i586.rpm 42d63d6a07d24c2f9cdeada44d2a0ed9 corporate/3.0/RPMS/XFree86-server-4.3-32.5.C30mdk.i586.rpm d6b6e11b2b4779279532b79743271dbb corporate/3.0/RPMS/XFree86-xfs-4.3-32.5.C30mdk.i586.rpm 2c84c0d863d2eb49b6057dc0674cad62 corporate/3.0/SRPMS/XFree86-4.3-32.5.C30mdk.src.rpm Corporate Server 3.0/X86_64 db45dc54f0ac9b1794f7fb7b2ec6df1d x86_64/corporate/3.0/RPMS/lib64xfree86-4.3-32.5.C30mdk.x86_64.rpm 79a7198a580493942ec454194b9df3dc x86_64/corporate/3.0/RPMS/libxfree86-4.3-32.5.C30mdk.i586.rpm 3a2cec2a9963ee2538435c5f5aeeeafb x86_64/corporate/3.0/RPMS/X11R6-contrib-4.3-32.5.C30mdk.x86_64.rpm 041ab13c48f7f2aaa14f4b17eb4dadc0 x86_64/corporate/3.0/RPMS/XFree86-100dpi-fonts-4.3-32.5.C30mdk.x86_64.rpm 3affb3ed2011df03e58142733f9bdfc4 x86_64/corporate/3.0/RPMS/XFree86-4.3-32.5.C30mdk.x86_64.rpm 0ba38ff1f92261c51f5498238870996e x86_64/corporate/3.0/RPMS/XFree86-75dpi-fonts-4.3-32.5.C30mdk.x86_64.rpm da26a29d00921e476cf816141980f28f x86_64/corporate/3.0/RPMS/XFree86-Xnest-4.3-32.5.C30mdk.x86_64.rpm 7d65065bd3d98af49bf3992d5db8812f x86_64/corporate/3.0/RPMS/XFree86-Xvfb-4.3-32.5.C30mdk.x86_64.rpm dbb3bbcf4d8bfead1d5aa1cf25d3189c x86_64/corporate/3.0/RPMS/XFree86-server-4.3-32.5.C30mdk.x86_64.rpm 72c560f4fd536ba44cc19b36a6660773 x86_64/corporate/3.0/RPMS/XFree86-xfs-4.3-32.5.C30mdk.x86_64.rpm 2c84c0d863d2eb49b6057dc0674cad62 x86_64/corporate/3.0/SRPMS/XFree86-4.3-32.5.C30mdk.src.rpm Mandrivalinux LE2005 eda3819b24cc8d0b6ec4b8bf4105f0fc 10.2/RPMS/libxorg-x11-6.8.2-7.2.102mdk.i586.rpm 2c54275fad068d146ca0656b8780c4b7 10.2/RPMS/libxorg-x11-devel-6.8.2-7.2.102mdk.i586.rpm 06497fee030024dcd80ee38303dd9483 10.2/RPMS/libxorg-x11-static-devel-6.8.2-7.2.102mdk.i586.rpm 0d9a6835f6d58919e1d8ac1382daba35 10.2/RPMS/X11R6-contrib-6.8.2-7.2.102mdk.i586.rpm aae1354a02ad96affb575b80baeef2f1 10.2/RPMS/xorg-x11-100dpi-fonts-6.8.2-7.2.102mdk.i586.rpm b7f61cc330c57ba79aea04ad14f2472a 10.2/RPMS/xorg-x11-6.8.2-7.2.102mdk.i586.rpm 5a212fb064dff0df6717e05a57350f07 10.2/RPMS/xorg-x11-75dpi-fonts-6.8.2-7.2.102mdk.i586.rpm 98b8a89bc6348eb01625994661555c8b 10.2/RPMS/xorg-x11-Xdmx-6.8.2-7.2.102mdk.i586.rpm 6812fe685170bd72a4e17cc92684c351 10.2/RPMS/xorg-x11-Xnest-6.8.2-7.2.102mdk.i586.rpm fbd543be90cffd0309e078aac1025e07 10.2/RPMS/xorg-x11-Xprt-6.8.2-7.2.102mdk.i586.rpm 0dfdc5c84324b769c193c024d2f26ea1 10.2/RPMS/xorg-x11-Xvfb-6.8.2-7.2.102mdk.i586.rpm 957fa313b32bfd22ce0216a776b105a8 10.2/RPMS/xorg-x11-cyrillic-fonts-6.8.2-7.2.102mdk.i586.rpm 7f2503f0a0ca23d7aa24853dd41d4f46 10.2/RPMS/xorg-x11-doc-6.8.2-7.2.102mdk.i586.rpm d7664da06681e39fc094926bdf0c5eab 10.2/RPMS/xorg-x11-glide-module-6.8.2-7.2.102mdk.i586.rpm f3f1400615bd4138f9ce088079188597 10.2/RPMS/xorg-x11-server-6.8.2-7.2.102mdk.i586.rpm 8eeca713ea54cfca7c6408682fd630f0 10.2/RPMS/xorg-x11-xauth-6.8.2-7.2.102mdk.i586.rpm 067d51b02761e19c5673a127eac8a6a5 10.2/RPMS/xorg-x11-xfs-6.8.2-7.2.102mdk.i586.rpm 766a90cb38b159e7dd6004e510b9c7b5 10.2/SRPMS/xorg-x11-6.8.2-7.2.102mdk.src.rpm Mandrivalinux LE2005/X86_64 638dcc0149a1031425bdb124649d08ba x86_64/10.2/RPMS/lib64xorg-x11-6.8.2-7.2.102mdk.x86_64.rpm db69f2202df94d90d86da0ca8865c2d7 x86_64/10.2/RPMS/lib64xorg-x11-devel-6.8.2-7.2.102mdk.x86_64.rpm aa49ae308cd57ec1b66b8f31036f7c6e x86_64/10.2/RPMS/lib64xorg-x11-static-devel-6.8.2-7.2.102mdk.x86_64.rpm eda3819b24cc8d0b6ec4b8bf4105f0fc x86_64/10.2/RPMS/libxorg-x11-6.8.2-7.2.102mdk.i586.rpm 2c54275fad068d146ca0656b8780c4b7 x86_64/10.2/RPMS/libxorg-x11-devel-6.8.2-7.2.102mdk.i586.rpm 06497fee030024dcd80ee38303dd9483 x86_64/10.2/RPMS/libxorg-x11-static-devel-6.8.2-7.2.102mdk.i586.rpm fa74cc5033ffdab3635fd0d1f97a1699 x86_64/10.2/RPMS/X11R6-contrib-6.8.2-7.2.102mdk.x86_64.rpm 76d3eab7c11f2eaf6d4c0be387b3fb30 x86_64/10.2/RPMS/xorg-x11-100dpi-fonts-6.8.2-7.2.102mdk.x86_64.rpm f68901c3e59087eafb72f95f31358d3c x86_64/10.2/RPMS/xorg-x11-6.8.2-7.2.102mdk.x86_64.rpm 33296fac1364c86fc0f5c81b2d7cce63 x86_64/10.2/RPMS/xorg-x11-75dpi-fonts-6.8.2-7.2.102mdk.x86_64.rpm 70960b6fdaca0b8ac1487d835d339cd4 x86_64/10.2/RPMS/xorg-x11-Xdmx-6.8.2-7.2.102mdk.x86_64.rpm 60c4833b441543a8c7c7aeecbc061222 x86_64/10.2/RPMS/xorg-x11-Xnest-6.8.2-7.2.102mdk.x86_64.rpm 4021b7e7eb3b633531014a9fad39ff06 x86_64/10.2/RPMS/xorg-x11-Xprt-6.8.2-7.2.102mdk.x86_64.rpm c4ab2a30ed4d90913f9d21b151d33cd4 x86_64/10.2/RPMS/xorg-x11-Xvfb-6.8.2-7.2.102mdk.x86_64.rpm 586f412c1946caf549e73a551f14fffc x86_64/10.2/RPMS/xorg-x11-cyrillic-fonts-6.8.2-7.2.102mdk.x86_64.rpm b3cefac069c3d9117ee4850e450675ad x86_64/10.2/RPMS/xorg-x11-doc-6.8.2-7.2.102mdk.x86_64.rpm 7883fb48b5340c5050420ddcaf7327bc x86_64/10.2/RPMS/xorg-x11-server-6.8.2-7.2.102mdk.x86_64.rpm 5ceb71822368d466cfde8ff90c37e041 x86_64/10.2/RPMS/xorg-x11-xauth-6.8.2-7.2.102mdk.x86_64.rpm 26d3b9b1b702c6c7321256de646f9371 x86_64/10.2/RPMS/xorg-x11-xfs-6.8.2-7.2.102mdk.x86_64.rpm 766a90cb38b159e7dd6004e510b9c7b5 x86_64/10.2/SRPMS/xorg-x11-6.8.2-7.2.102mdk.src.rpm References http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2495 Upgrade To upgrade automatically, use MandrakeUpdate. Verification Please verify the update prior to upgrading to ensure the integrity of the downloaded package. You can do this with the command : rpm --checksig package.rpm You can get the GPG public key of the Mandriva Security Team to verify the GPG signature of each RPM. If you use MandrakeUpdate, the verification of md5 checksum and GPG signature is performed automatically for you. The released versions of Mandriva GNU/Linux affected are: Full information about this advisory, including the updated packages, is available at: wwwnew.mandriva.com/security/advisories?name=MDKSA-2005:206-1 Posted automatically by aru (mdksec2mub v: mdksec2mub,v 0.15 2005/11/24 16:53:12 aru Exp aru $)
  8. Mandriva Advisories MDKSA-2005:223 : webmin Updated webmin package fixes format string vulnerability December 2nd, 2005 Jack Louis discovered a format string vulnerability in miniserv.pl Perl web server in Webmin before 1.250 and Usermin before 1.180, with syslog logging enabled. This can allow remote attackers to cause a denial of service (crash or memory consumption) and possibly execute arbitrary code via format string specifiers in the username parameter to the login form, which is ultimately used in a syslog call. The released versions of Mandriva GNU/Linux affected are: 10.1 CS2.1 CS3.0 10.2 2006.0 Full information about this advisory, including the updated packages, is available at: wwwnew.mandriva.com/security/advisories?name=MDKSA-2005:223 Other references: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-3912 Posted automatically by aru (mdksec2mub v: mdksec2mub,v 0.15 2005/11/24 16:53:12 aru Exp aru $)
  9. Mandriva Advisories MDKSA-2005:222 : mailman Updated mailman packages fix various vulnerabilities December 2nd, 2005 Scrubber.py in Mailman 2.1.4 - 2.1.6 does not properly handle UTF8 character encodings in filenames of e-mail attachments, which allows remote attackers to cause a denial of service. (CVE-2005-3573) In addition, these versions of mailman have an issue where the server will fail with an Overflow on bad date data in a processed message. The version of mailman in Corporate Server 2.1 does not contain the above vulnerable code. Updated packages are patched to correct these issues. The released versions of Mandriva GNU/Linux affected are: 10.1 CS3.0 10.2 2006.0 Full information about this advisory, including the updated packages, is available at: wwwnew.mandriva.com/security/advisories?name=MDKSA-2005:222 Other references: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3573 Posted automatically by aru (mdksec2mub v: mdksec2mub,v 0.15 2005/11/24 16:53:12 aru Exp aru $)
  10. Mandriva Advisories MDKSA-2005:221 : spamassassin Updated spamassassin packages fixes vulnerability December 2nd, 2005 SpamAssassin 3.0.4 allows attackers to bypass spam detection via an e-mail with a large number of recipients ("To" addresses), which triggers a bus error in Perl. Updated packages have been patched to address this issue. The released versions of Mandriva GNU/Linux affected are: 10.1 10.2 2006.0 Full information about this advisory, including the updated packages, is available at: wwwnew.mandriva.com/security/advisories?name=MDKSA-2005:221 Other references: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3351 Posted automatically by aru (mdksec2mub v: mdksec2mub,v 0.15 2005/11/24 16:53:12 aru Exp aru $)
  11. Mandriva Advisories MDKA-2005:058 : eagle-usb Updated eagle-usb packages fixes firmware loading issues December 2nd, 2005 This update loads the firmware each time an eagle-usb modem is plugged in, not just when the eagle-usb module is loaded. The released versions of Mandriva GNU/Linux affected are: 2006.0 Full information about this advisory, including the updated packages, is available at: wwwnew.mandriva.com/security/advisories?name=MDKA-2005:058 Posted automatically by aru (mdksec2mub v: mdksec2mub,v 0.15 2005/11/24 16:53:12 aru Exp aru $)
  12. Mandriva Advisories MDKSA-2005:220 : kernel Updated kernel packages fix numerous vulnerabilities November 30th, 2005 Multiple vulnerabilities in the Linux 2.6 kernel have been discovered and corrected in this update: The kernel on x86_64 platforms does not use a guard page for the 47-bit address page to protect against an AMD K8 bug which allows a local user to cause a DoS (CVE-2005-1764). The KEYCTL_JOIN_SESSION_KEYRING operation in versions prior to 2.6.12.5 contains an error path that does not properly release the session management semaphore, which allows local users or remote attackers to cause a DoS (semaphore hang) via a new session keyring with an empty name string, a long name string, the key quota reached, or ENOMEM (CVE-2005-2098). Kernels prior to 2.6.12.5 do not properly destroy a keyring that is not instantiated properly, allowing a local user or remote attacker to cause a DoS (oops) via a keyring with a payload that is not empty (CVE-2005-2099). An array index overflow in the xfrm_sk_policy_insert function in xfrm_user.c allows local users to cause a DoS (oops or deadlock) and possibly execute arbitrary code (CVE-2005-2456). The zisofs driver in versions prior to 2.6.12.5 allows local users and remove attackers to cause a DoS (crash) via a crafted compressed ISO filesystem (CVE-2005-2457). inflate.c in the zlib routines in versions prior to 2.6.12.5 allow remove attackers to cause a DoS (crash) via a compressed file with "improper tables" (CVE-2005-2458). The huft_build function in inflate.c in the zlib routines in versions prior to 2.6.12.5 returns the wrong value, allowing remote attackers to cause a DoS (crash) via a certain compressed file that leads to a null pointer dereference (CVE-2005-2459). A stack-based buffer overflow in the sendmsg function call in versions prior to 2.6.13.1 allow local users to execute arbitrary code by calling sendmsg and modifying the message contents in another thread (CVE-2005-2490). The raw_sendmsg function in versions prior to 2.6.13.1 allow local users to cause a DoS (change hardware state) or read from arbitrary memory via crafted input (CVE-2005-2492). A memory leak in the seq_file implementation in the SCSI procfs interface (sg.c) in 2.6.13 and earlier allows a local user to cause a DoS (memory consumption) via certain repeated reads from /proc/scsi/gs/devices file which is not properly handled when the next() interator returns NULL or an error (CVE-2005-2800). The ipt_recent module in versions prior to 2.6.12 when running on 64bit processors allows remote attackers to cause a DoS (kernel panic) via certain attacks such as SSH brute force (CVE-2005-2872). The ipt_recent module in versions prior to 2.6.12 does not properly perform certain tests when the jiffies value is greater than LONG_MAX, which can cause ipt_recent netfilter rules to block too early (CVE-2005-2873). Multiple vulnerabilities in versions prior to 2.6.13.2 allow local users to cause a DoS (oops from null dereference) via fput in a 32bit ioctl on 64-bit x86 systems or sockfd_put in the 32-bit routing_ioctl function on 64-bit systems (CVE-2005-3044). The sys_set_mempolicy function in mempolicy.c allows local users to cause a DoS via a negative first argument (CVE-2005-3053). Versions 2.6.8 to 2.6.14-rc2 allow local users to cause a DoS (oops) via a userspace process that issues a USB Request Block (URB) to a USB device and terminates before the URB is finished, which leads to a stale pointer reference (CVE-2005-3055). drm.c in version 2.6.13 and earlier creates a debug file in sysfs with world-readable and world-writable permissions, allowing local users to enable DRM debugging and obtain sensitive information (CVE-2005-3179). The Orinoco driver in 2.6.13 and earlier does not properly clear memory from a previously used packet whose length is increased, allowing remote attackers to obtain sensitive information (CVE-2005-3180). Kernels 2.6.13 and earlier, when CONFIG_AUDITSYSCALL is enabled, use an incorrect function to free names_cache memory, preventing the memory from being tracked by AUDITSYSCALL code and leading to a memory leak (CVE-2005-3181). The VT implementation in version 2.6.12 allows local users to use certain IOCTLs on terminals of other users and gain privileges (CVE-2005-3257). Exec does not properly clear posix-timers in multi-threaded environments, which result in a resource leak and could allow a large number of multiple local users to cause a DoS by using more posix- timers than specified by the quota for a single user (CVE-2005-3271). The rose_rt_ioctl function rose_route.c in versions prior to 2.6.12 does not properly verify the ndigis argument for a new route, allowing an attacker to trigger array out-of-bounds errors with a large number of digipeats (CVE-2005-3273). A race condition in ip_vs_conn_flush in versions prior to 2.6.13, when running on SMP systems, allows local users to cause a DoS (null dereference) by causing a connection timer to expire while the connection table is being flushed before the appropriate lock is acquired (CVE-2005-3274). The NAT code in versions prior to 2.6.13 incorrectly declares a variable to be static, allowing remote attackers to cause a DoS (memory corruption) by causing two packets for the same protocol to be NATed at the same time (CVE-2005-3275). The sys_get_thread_area function in process.c in versions prior to 2.6.12.4 and 2.6.13 does not clear a data structure before copying it to userspace, which may allow a user process to obtain sensitive information (CVE-2005-3276). The provided packages are patched to fix these vulnerabilities.All users are encouraged to upgrade to these updated kernels. To update your kernel, please follow the directions located at: http://www.mandriva.com/en/security/kernelupdate The released versions of Mandriva GNU/Linux affected are: 10.2 Full information about this advisory, including the updated packages, is available at: wwwnew.mandriva.com/security/advisories?name=MDKSA-2005:220 Other references: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1764 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2098 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2099 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2456 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2457 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2458 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2459 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2490 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2492 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2800 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2872 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2873 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3044 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3053 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3055 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3179 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3180 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3181 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3257 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3273 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3274 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3275 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3276 Posted automatically by aru (mdksec2mub v: mdksec2mub,v 0.15 2005/11/24 16:53:12 aru Exp aru $)
  13. Mandriva Advisories MDKSA-2005:219 : kernel Updated kernel packages fix numerous vulnerabilities November 30th, 2005 Multiple vulnerabilities in the Linux 2.6 kernel have been discovered and corrected in this update: An integer overflow in vc_resize (CAN-2004-1333). A race condition in the sysfs_read_file and sysfs_write_file functions in 2.6.10 and earlier allows local users to read kernel memory and cause a DoS (crash) via large offsets in sysfs files (CAN-2004-2302). An integer signedness error in scsi_ioctl.c (CVE-2005-0180). Netfilter allows a local user to cause a DoS (memory consumption) via certain packet fragments that are reassembled twice, which causes a data structure to be allocated twice (CVE-2005-0210). A DoS in pkt_ioctl in pktcdvc.c (CVE-2005-1589). An array index overflow in the xfrm_sk_policy_insert function in xfrm_user.c allows local users to cause a DoS (oops or deadlock) and possibly execute arbitrary code (CVE-2005-2456). The zisofs driver in versions prior to 2.6.12.5 allows local users and remove attackers to cause a DoS (crash) via a crafted compressed ISO filesystem (CVE-2005-2457). inflate.c in the zlib routines in versions prior to 2.6.12.5 allow remove attackers to cause a DoS (crash) via a compressed file with "improper tables" (CVE-2005-2458). The huft_build function in inflate.c in the zlib routines in versions prior to 2.6.12.5 returns the wrong value, allowing remote attackers to cause a DoS (crash) via a certain compressed file that leads to a null pointer dereference (CVE-2005-2459). A stack-based buffer overflow in the sendmsg function call in versions prior to 2.6.13.1 allow local users to execute arbitrary code by calling sendmsg and modifying the message contents in another thread (CVE-2005-2490). vlan_dev.c in version 2.6.8 allows remote attackers to cause a DoS (oops from null dereference) via certain UDP packets that lead to a function call with the wrong argument (CVE-2005-2548). The kernel does not properly restrict socket policy access to users with the CAP_NET_ADMIN capability, which could allow local users to conduct unauthorized activities via ipv4/ip_sockglue.c and ipv6/ipv6_sockglue.c (CVE-2005-2555). A memory leak in the seq_file implementation in the SCSI procfs interface (sg.c) in 2.6.13 and earlier allows a local user to cause a DoS (memory consumption) via certain repeated reads from /proc/scsi/gs/devices file which is not properly handled when the next() interator returns NULL or an error (CVE-2005-2800). xattr.c in the ext2 and ext3 file system code does not properly compare the name_index fields when sharing xattr blocks which could prevent ACLs from being applied (CVE-2005-2801). The ipt_recent module in versions prior to 2.6.12 when running on 64bit processors allows remote attackers to cause a DoS (kernel panic) via certain attacks such as SSH brute force (CVE-2005-2872). The ipt_recent module in versions prior to 2.6.12 does not properly perform certain tests when the jiffies value is greater than LONG_MAX, which can cause ipt_recent netfilter rules to block too early (CVE-2005-2873). Multiple vulnerabilities in versions prior to 2.6.13.2 allow local users to cause a DoS (oops from null dereference) via fput in a 32bit ioctl on 64-bit x86 systems or sockfd_put in the 32-bit routing_ioctl function on 64-bit systems (CVE-2005-3044). The sys_set_mempolicy function in mempolicy.c allows local users to cause a DoS via a negative first argument (CVE-2005-3053). Versions 2.6.8 to 2.6.14-rc2 allow local users to cause a DoS (oops) via a userspace process that issues a USB Request Block (URB) to a USB device and terminates before the URB is finished, which leads to a stale pointer reference (CVE-2005-3055). The Orinoco driver in 2.6.13 and earlier does not properly clear memory from a previously used packet whose length is increased, allowing remote attackers to obtain sensitive information (CVE-2005-3180). Kernels 2.6.13 and earlier, when CONFIG_AUDITSYSCALL is enabled, use an incorrect function to free names_cache memory, preventing the memory from being tracked by AUDITSYSCALL code and leading to a memory leak (CVE-2005-3181). The VT implementation in version 2.6.12 allows local users to use certain IOCTLs on terminals of other users and gain privileges (CVE-2005-3257). Exec does not properly clear posix-timers in multi-threaded environments, which result in a resource leak and could allow a large number of multiple local users to cause a DoS by using more posix- timers than specified by the quota for a single user (CVE-2005-3271). The rose_rt_ioctl function rose_route.c in versions prior to 2.6.12 does not properly verify the ndigis argument for a new route, allowing an attacker to trigger array out-of-bounds errors with a large number of digipeats (CVE-2005-3273). A race condition in ip_vs_conn_flush in versions prior to 2.6.13, when running on SMP systems, allows local users to cause a DoS (null dereference) by causing a connection timer to expire while the connection table is being flushed before the appropriate lock is acquired (CVE-2005-3274). The NAT code in versions prior to 2.6.13 incorrectly declares a variable to be static, allowing remote attackers to cause a DoS (memory corruption) by causing two packets for the same protocol to be NATed at the same time (CVE-2005-3275). The sys_get_thread_area function in process.c in versions prior to 2.6.12.4 and 2.6.13 does not clear a data structure before copying it to userspace, which may allow a user process to obtain sensitive information (CVE-2005-3276). The following non-security fixes are also applied: Driver updates were made to the aic97xx and sata_sil modules. Support was added for ATI ipx400 chipsets, for IDE and sound. A build problem with icecream on the x86_64 platform was fixed. The pin1 APIC timer on RS480-based motherboards was disabled. The provided packages are patched to fix these vulnerabilities.All users are encouraged to upgrade to these updated kernels. To update your kernel, please follow the directions located at: http://www.mandriva.com/en/security/kernelupdate The released versions of Mandriva GNU/Linux affected are: 10.1 Full information about this advisory, including the updated packages, is available at: wwwnew.mandriva.com/security/advisories?name=MDKSA-2005:219 Other references: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1333 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-2302 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0180 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0210 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1589 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2456 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2457 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2458 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2459 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2490 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2548 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2555 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2800 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2801 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2872 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2873 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3044 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3053 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3055 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3180 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3181 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3257 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3271 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3273 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3274 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3275 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3276 Posted automatically by aru (mdksec2mub v: mdksec2mub,v 0.15 2005/11/24 16:53:12 aru Exp aru $)
  14. Mandriva Advisories MDKSA-2005:218 : kernel Updated kernel packages fix numerous vulnerabilities November 30th, 2005 Multiple vulnerabilities in the Linux 2.6 kernel have been discovered and corrected in this update: An integer overflow in vc_resize (CAN-2004-1333). A race condition in the sysfs_read_file and sysfs_write_file functions in 2.6.10 and earlier allows local users to read kernel memory and cause a DoS (crash) via large offsets in sysfs files (CAN-2004-2302). An integer signedness error in scsi_ioctl.c (CVE-2005-0180). Netfilter allows a local user to cause a DoS (memory consumption) via certain packet fragments that are reassembled twice, which causes a data structure to be allocated twice (CVE-2005-0210). The netfilter/iptables module in versions prior to 2.6.8.1 allow remote attackers to cause a DoS (crash) or bypass firewall rules via crafted packets, which are not properly handled by skb_checksum_help function (CVE-2005-0449). The zisofs driver in versions prior to 2.6.12.5 allows local users and remove attackers to cause a DoS (crash) via a crafted compressed ISO filesystem (CVE-2005-2457). The kernel does not properly restrict socket policy access to users with the CAP_NET_ADMIN capability, which could allow local users to conduct unauthorized activities via ipv4/ip_sockglue.c and ipv6/ipv6_sockglue.c (CVE-2005-2555). A memory leak in the seq_file implementation in the SCSI procfs interface (sg.c) in 2.6.13 and earlier allows a local user to cause a DoS (memory consumption) via certain repeated reads from /proc/scsi/gs/devices file which is not properly handled when the next() interator returns NULL or an error (CVE-2005-2800). Multiple vulnerabilities in versions prior to 2.6.13.2 allow local users to cause a DoS (oops from null dereference) via fput in a 32bit ioctl on 64-bit x86 systems or sockfd_put in the 32-bit routing_ioctl function on 64-bit systems (CVE-2005-3044). Versions 2.6.8 to 2.6.14-rc2 allow local users to cause a DoS (oops) via a userspace process that issues a USB Request Block (URB) to a USB device and terminates before the URB is finished, which leads to a stale pointer reference (CVE-2005-3055). The Orinoco driver in 2.6.13 and earlier does not properly clear memory from a previously used packet whose length is increased, allowing remote attackers to obtain sensitive information (CVE-2005-3180). Kernels 2.6.13 and earlier, when CONFIG_AUDITSYSCALL is enabled, use an incorrect function to free names_cache memory, preventing the memory from being tracked by AUDITSYSCALL code and leading to a memory leak (CVE-2005-3181). The VT implementation in version 2.6.12 allows local users to use certain IOCTLs on terminals of other users and gain privileges (CVE-2005-3257). Exec does not properly clear posix-timers in multi-threaded environments, which result in a resource leak and could allow a large number of multiple local users to cause a DoS by using more posix- timers than specified by the quota for a single user (CVE-2005-3271). The rose_rt_ioctl function rose_route.c in versions prior to 2.6.12 does not properly verify the ndigis argument for a new route, allowing an attacker to trigger array out-of-bounds errors with a large number of digipeats (CVE-2005-3273). A race condition in ip_vs_conn_flush in versions prior to 2.6.13, when running on SMP systems, allows local users to cause a DoS (null dereference) by causing a connection timer to expire while the connection table is being flushed before the appropriate lock is acquired (CVE-2005-3274). The NAT code in versions prior to 2.6.13 incorrectly declares a variable to be static, allowing remote attackers to cause a DoS (memory corruption) by causing two packets for the same protocol to be NATed at the same time (CVE-2005-3275). The sys_get_thread_area function in process.c in versions prior to 2.6.12.4 and 2.6.13 does not clear a data structure before copying it to userspace, which may allow a user process to obtain sensitive information (CVE-2005-3276). The following non-security fixes are also applied: Support for the arp_ignore and arp_announce sysctls were added to the Corporate 3 kernels (bugzilla #16346). The provided packages are patched to fix these vulnerabilities.All users are encouraged to upgrade to these updated kernels. To update your kernel, please follow the directions located at: http://www.mandriva.com/en/security/kernelupdate The released versions of Mandriva GNU/Linux affected are: CS3.0 MNF2.0 Full information about this advisory, including the updated packages, is available at: wwwnew.mandriva.com/security/advisories?name=MDKSA-2005:218 Other references: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1333 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-2302 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0180 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0210 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-0449 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2457 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2555 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2800 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3044 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3055 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3180 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3181 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3257 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3271 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3273 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3274 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3275 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3276 Posted automatically by aru (mdksec2mub v: mdksec2mub,v 0.15 2005/11/24 16:53:12 aru Exp aru $)
  15. Mandriva Advisories MDKSA-2005:217 : netpbm Updated netpbm packages fix pnmtopng vulnerabilities November 30th, 2005 Greg Roelofs discovered and fixed several buffer overflows in pnmtopng which is also included in netpbm, a collection of graphic conversion utilities, that can lead to the execution of arbitrary code via a specially crafted PNM file. Multiple buffer overflows in pnmtopng in netpbm 10.0 and earlier allow attackers to execute arbitrary code via a crafted PNM file. (CVE-2005-3632) An off-by-one buffer overflow in pnmtopng, when using the -alpha command line option, allows attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted PNM file with exactly 256 colors. (CVE-2005-3662) The updated packages have been patched to correct this problem. The released versions of Mandriva GNU/Linux affected are: 10.1 CS2.1 CS3.0 Full information about this advisory, including the updated packages, is available at: wwwnew.mandriva.com/security/advisories?name=MDKSA-2005:217 Other references: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3632 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3662 Posted automatically by aru (mdksec2mub v: mdksec2mub,v 0.15 2005/11/24 16:53:12 aru Exp aru $)
  16. Mandriva Advisories MDKSA-2005:216 : fuse Updated fuse packages fix vulnerability November 24th, 2005 Thomas Beige found that fusermount failed to securely handle special characters specified in mount points, which could allow a local attacker to corrupt the contents of /etc/mtab by mounting over a maliciously-named directory using fusermount.This could potentially allow the attacker to set unauthorized mount options. This is only possible when fusermount is installed setuid root, which is the case in Mandriva Linux. The updated packages have been patched to address these problems. The released versions of Mandriva GNU/Linux affected are: 2006.0 Full information about this advisory, including the updated packages, is available at: wwwnew.mandriva.com/security/advisories?name=MDKSA-2005:216 Other references: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3531 Posted automatically by aru (mdksec2mub v: mdksec2mub,v 0.15 2005/11/24 16:53:12 aru Exp aru $)
  17. Mandriva Advisories MDKSA-2005:215 : binutils Updated binutils packages fix vulnerabilities November 23rd, 2005 Integer overflows in various applications in the binutils package may allow attackers to execute arbitrary code via a carefully crafted object file. The updated packages have been patched to help address these problems. The released versions of Mandriva GNU/Linux affected are: 10.1 CS2.1 CS3.0 MNF2.0 10.2 Full information about this advisory, including the updated packages, is available at: wwwnew.mandriva.com/security/advisories?name=MDKSA-2005:215 Other references: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-1704 Posted automatically by aru (mdksec2mub v: mdksec2mub,v 0.15 2005/11/24 16:53:12 aru Exp aru $)
  18. Mandriva Advisories MDKSA-2005:214 : gdk-pixbuf Updated gdk-pixbuf/gtk+2.0 packages fix vulnerability November 18th, 2005 A heap overflow vulnerability in the GTK+ gdk-pixbuf XPM image rendering library could allow for arbitrary code execution. This allows an attacker to provide a carefully crafted XPM image which could possibly allow for arbitrary code execution in the context of the user viewing the image. (CVE-2005-3186) Ludwig Nussel discovered an integer overflow bug in the way gdk-pixbuf processes XPM images. An attacker could create a carefully crafted XPM file in such a way that it could cause an application linked with gdk-pixbuf to execute arbitrary code or crash when the file was opened by a victim. (CVE-2005-2976) Ludwig Nussel also discovered an infinite-loop denial of service bug in the way gdk-pixbuf processes XPM images. An attacker could create a carefully crafted XPM file in such a way that it could cause an application linked with gdk-pixbuf to stop responding when the file was opened by a victim. (CVE-2005-2975) The gtk+2.0 library also contains the same gdk-pixbuf code with the same vulnerability. The Corporate Server 2.1 packages have additional patches to address CAN-2004-0782,0783,0788 (additional XPM/ICO image issues), CAN-2004-0753 (BMP image issues) and CAN-2005-0891 (additional BMP issues). These were overlooked on this platform with earlier updates. The updated packages have been patched to correct these issues. The released versions of Mandriva GNU/Linux affected are: CS2.1 CS3.0 10.2 2006.0 Full information about this advisory, including the updated packages, is available at: wwwnew.mandriva.com/security/advisories?name=MDKSA-2005:214 Other references: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2975 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2976 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3186 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0782 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0783 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0788 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0753 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0891 Posted automatically by aru (mdksec2mub v: mdksec2mub,v 0.15 2005/11/24 16:53:12 aru Exp aru $)
  19. Mandriva Advisories MDKA-2005:057 : drakxtools Updated drakxtools packages fix various bugs November 18th, 2005 A number of bugs have been fixed in this new drakxtools package, primarily within the diskdrake, drakconnect and drakroam programs: Diskdrake fixes include: - handle "users" the way "user" is handled - handle dmraid-1.0.0 RC9 (#19654) Drakconnect fixes include: - don't screw up eagle-usb devices if the firmware is already loaded - fix zd1201 devices detection as well Drakroam fixes include: - remember 'restricted' wireless mode - don't crash if mandi isn't started (#19608) - fix wireless network list using iwlist (#19742) The released versions of Mandriva GNU/Linux affected are: 2006.0 Full information about this advisory, including the updated packages, is available at: wwwnew.mandriva.com/security/advisories?name=MDKA-2005:057 Posted automatically by aru (mdksec2mub v: mdksec2mub,v 0.15 2005/11/24 16:53:12 aru Exp aru $)
  20. Mandriva Advisories MDKA-2005:056 : file Updated file package fixes segfault November 18th, 2005 A bug in the file program would cause it to segfault on the x86_64 architecture on certain files.This update corrects the problem. The released versions of Mandriva GNU/Linux affected are: 2006.0 Full information about this advisory, including the updated packages, is available at: wwwnew.mandriva.com/security/advisories?name=MDKA-2005:056 Posted automatically by aru (mdksec2mub v: mdksec2mub,v 0.15 2005/11/24 16:53:12 aru Exp aru $)
  21. Mandriva Advisories MDKSA-2005:213 : php Updated php packages fix multiple vulnerabilities November 16th, 2005 A number of vulnerabilities were discovered in PHP: An issue with fopen_wrappers.c would not properly restrict access to other directories when the open_basedir directive included a trailing slash (CVE-2005-3054); this issue does not affect Corporate Server 2.1. An issue with the apache2handler SAPI in mod_php could allow an attacker to cause a Denial of Service via the session.save_path option in an .htaccess file or VirtualHost stanza (CVE-2005-3319); this issue does not affect Corporate Server 2.1. A Denial of Service vulnerability was discovered in the way that PHP processes EXIF image data which could allow an attacker to cause PHP to crash by supplying carefully crafted EXIF image data (CVE-2005-3353). A cross-site scripting vulnerability was discovered in the phpinfo() function which could allow for the injection of javascript or HTML content onto a page displaying phpinfo() output, or to steal data such as cookies (CVE-2005-3388). A flaw in the parse_str() function could allow for the enabling of register_globals, even if it was disabled in the PHP configuration file (CVE-2005-3389). A vulnerability in the way that PHP registers global variables during a file upload request could allow a remote attacker to overwrite the $GLOBALS array which could potentially lead the execution of arbitrary PHP commands.This vulnerability only affects systems with register_globals enabled (CVE-2005-3390). The updated packages have been patched to address this issue.Once the new packages have been installed, you will need to restart your Apache server using "service httpd restart" in order for the new packages to take effect ("service httpd2-naat restart" for MNF2). The released versions of Mandriva GNU/Linux affected are: 10.1 CS2.1 CS3.0 MNF2.0 10.2 2006.0 Full information about this advisory, including the updated packages, is available at: wwwnew.mandriva.com/security/advisories?name=MDKSA-2005:213 Other references: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3054 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3319 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3353 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3388 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3389 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3390 http://www.hardened-php.net/advisory_202005.79.html http://www.hardened-php.net/advisory_192005.78.html http://www.hardened-php.net/advisory_182005.77.html Posted automatically by aru (mdksec2mub v: mdksec2mub,v 0.15 2005/11/24 16:53:12 aru Exp aru $)
  22. Mandriva Advisories MDKSA-2005:212 : egroupware Updated egroupware packages to address phpldapadmin, phpsysinfo vulnerabilities November 16th, 2005 Egroupware contains embedded copies of several php based projects, including phpldapadmin and phpsysinfo. Phpldapadmin before 0.9.6c allows remote attackers to gain anonymous access to the LDAP server, even when disable_anon_bind is set, via an HTTP request to login.php with the anonymous_bind parameter set. (CAN-2005-2654) Directory traversal vulnerability in welcome.php in phpLDAPadmin 0.9.6 and 0.9.7 allows remote attackers to read arbitrary files via a .. (dot dot) in the custom_welcome_page parameter. (CAN-2005-2792) PHP remote code injection vulnerability in welcome.php in phpLDAPadmin 0.9.6 and 0.9.7 allows remote attackers to execute arbitrary PHP code via the custom_welcome_page parameter. (CAN-2005-2793) Maksymilian Arciemowicz discovered several cross site scripting issues inphpsysinfo, a PHP based host information application. (CAN-2005-0869, 0870) Christopher Kunz discovered that local variables in phpsysinfo get overwritten unconditionally and are trusted later, which could lead to the inclusion of arbitrary files. (CAN-2005-3347) Christopher Kunz discovered that user-supplied input in phpsysinfo is used unsanitised, causing a HTTP Response splitting problem. (CAN-2005-3348) The updated packages have new versions of these subsystems to correct these issues. The released versions of Mandriva GNU/Linux affected are: CS3.0 Full information about this advisory, including the updated packages, is available at: wwwnew.mandriva.com/security/advisories?name=MDKSA-2005:212 Other references: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2654 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2792 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2793 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0869 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-0870 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-3347 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-3348 Posted automatically by aru (mdksec2mub v: mdksec2mub,v 0.15 2005/11/24 16:53:12 aru Exp aru $)
  23. Mandriva Advisories MDKA-2005:055 : acpid Updated acpid package fixes various bugs November 16th, 2005 A number of bugs have been fixed in this new acpid package: Correct an error in the initscript, to look for lm_battery.sh rather than battery.sh. Correct an issue where logrotate of acpid's log files would cause the X server to consume 100% cpu. Note: In order to restart the acpid service you may have to stop X (telinit 3 if you use a graphical login, or exit X if you use startx). The released versions of Mandriva GNU/Linux affected are: 2006.0 Full information about this advisory, including the updated packages, is available at: wwwnew.mandriva.com/security/advisories?name=MDKA-2005:055 Posted automatically by aru (mdksec2mub v: mdksec2mub,v 0.15 2005/11/24 16:53:12 aru Exp aru $)
  24. Mandriva Advisories MDKA-2005:054 : autofs Updated autofs packages fix problem with LDAP November 16th, 2005 A problem with how autofs was linked with the LDAP libraries would cause autofs to segfault on startup. The updated package has been fixed to correct this problem. The released versions of Mandriva GNU/Linux affected are: 2006.0 Full information about this advisory, including the updated packages, is available at: wwwnew.mandriva.com/security/advisories?name=MDKA-2005:054 Posted automatically by aru (mdksec2mub v: mdksec2mub,v 0.15 2005/11/24 16:53:12 aru Exp aru $)
  25. Mandriva Advisories MDKSA-2005:211 : lynx Updated lynx packages fix critical vulnerability November 12th, 2005 An arbitrary command execution vulnerability was discovered in the lynx "lynxcgi:" URI handler.An attacker could create a web page that redirects to a malicious URL which could then execute arbitrary code as the user running lynx. The updated packages have been patched to address this issue. The released versions of Mandriva GNU/Linux affected are: 10.1 CS2.1 CS3.0 MNF2.0 10.2 2006.0 Full information about this advisory, including the updated packages, is available at: wwwnew.mandriva.com/security/advisories?name=MDKSA-2005:211 Other references: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2005-2929 Posted automatically by aru (mdksec2mub v: mdksec2mub,v 0.15 2005/11/24 16:53:12 aru Exp aru $)
×
×
  • Create New...