2015 m. kovo 31 d., antradienis

[ MDVSA-2015:140 ] ntp

Mandriva Linux Security Advisory                         MDVSA-2015:140
 http://www.mandriva.com/en/support/security/
 ____________________________________________________________
___________

 Package : ntp
 Date    : March 29, 2015
 Affected: Business Server 2.0
 _______________________________________________________________________

 Problem Description:

 Updated ntp packages fix security vulnerabilities:

 If no authentication key is defined in the ntp.conf file, a
 cryptographically-weak default key is generated (CVE-2014-9293).

 ntp-keygen before 4.2.7p230 uses a non-cryptographic random number
 generator with a weak seed to generate symmetric keys (CVE-2014-9294).

[ MDVSA-2015:138 ] patch

 Mandriva Linux Security Advisory                         MDVSA-2015:138
 http://www.mandriva.com/en/support/security/
 ____________________________________________________________
___________

 Package : patch
 Date    : March 29, 2015
 Affected: Business Server 2.0
 _______________________________________________________________________

 Problem Description:

 Updated patch package fixes security vulnerabilities:

 It was reported that a crafted diff file can make patch eat memory
 and later segfault (CVE-2014-9637).

 It was reported that the versions of the patch utility that support
 Git-style patches are vulnerable to a directory traversal flaw. This
 could allow an attacker to overwrite arbitrary files by applying a
 specially crafted patch, with the privileges of the user running patch
 (CVE-2015-1395).

 GNU patch before 2.7.4 allows remote attackers to write to arbitrary
 files via a symlink attack in a patch file (CVE-2015-1196).

[ MDVSA-2015:141 ] not-yet-commons-ssl

 Mandriva Linux Security Advisory                         MDVSA-2015:141
 http://www.mandriva.com/en/support/security/
 ____________________________________________________________
___________

 Package : not-yet-commons-ssl
 Date    : March 29, 2015
 Affected: Business Server 2.0
 _______________________________________________________________________

 Problem Description:

 Updated not-yet-commons-ssl packages fixes security vulnerability:

 It was discovered that the implementation used by the Not Yet Commons
 SSL project to check that the server hostname matches the domain
 name in the subject's CN field was flawed. This can be exploited by
 a Man-in-the-middle (MITM) attack, where the attacker can spoof a
 valid certificate using a specially crafted subject (CVE-2014-3604).
 ________________________________________________________

[ MDVSA-2015:142 ] nodejs

Mandriva Linux Security Advisory                         MDVSA-2015:142
 http://www.mandriva.com/en/support/security/
 ____________________________________________________________
___________

 Package : nodejs
 Date    : March 29, 2015
 Affected: Business Server 2.0
 _______________________________________________________________________

 Problem Description:

 Updated nodejs package fixes security vulnerabilities:

 A memory corruption vulnerability, which results in a
 denial-of-service, was identified in the versions of V8 that ship with
 Node.js 0.8 and 0.10. In certain circumstances, a particularly deep
 recursive workload that may trigger a GC and receive an interrupt may
 overflow the stack and result in a segmentation fault. For instance,
 if your work load involves successive JSON.parse calls and the parsed
 objects are significantly deep, you may experience the process aborting
 while parsing (CVE-2014-5256).

 Multiple unspecified vulnerabilities in Google V8 before 3.24.35.10,
 as used in Node.js before 0.10.31, allow attackers to cause a
 denial of service or possibly have other impact via unknown vectors
 (CVE-2013-6668).

 The nodejs package has been updated to version 0.10.33 to fix these
 issues as well as several other bugs.

[ MDVSA-2015:143 ] mpfr

Mandriva Linux Security Advisory                         MDVSA-2015:143
 http://www.mandriva.com/en/support/security/
 ____________________________________________________________
___________

 Package : mpfr
 Date    : March 29, 2015
 Affected: Business Server 2.0
 _______________________________________________________________________

 Problem Description:

 Updated mpfr packages fix security vulnerability:

 A buffer overflow was reported in mpfr. This is due to incorrect
 GMP documentation for mpn_set_str about the size of a buffer
 (CVE-2014-9474).

[ MDVSA-2015:144 ] lua

 Mandriva Linux Security Advisory                         MDVSA-2015:144
 http://www.mandriva.com/en/support/security/
 ____________________________________________________________
___________

 Package : lua
 Date    : March 29, 2015
 Affected: Business Server 2.0
 _______________________________________________________________________

 Problem Description:

 Updated lua and lua5.1 packages fix security vulnerability:

 A heap-based overflow vulnerability was found in the way Lua handles
 varargs functions with many fixed parameters called with few arguments,
 leading to application crashes or, potentially, arbitrary code
 execution (CVE-2014-5461).