Mandriva 1275 Published by Philipp Esselbach 0

Updated KDE packages are available for Mandrakelinux
_______________________________________________________________________

Mandrakelinux Update Advisory
_______________________________________________________________________

Package name: kde
Advisory ID: MDKA-2005:010
Date: February 17th, 2005

Affected versions: 10.1
______________________________________________________________________

Problem Description:

New KDE packages are available to address various bugs. The details are as follows.

Kdebase:

- fix klipper kde bug #75618
- fix konqueror kde bug #66361
- fix kfind kde bug #98423
- fix mozilla session managment

Kdenetwork:

- fix kopete kde bug #95804
- fix kget kde bug #92829
- fix kopete kde bug #96304

Kdepim:

- fix kmail header list empty
- fix kmail encrypted email
- fix certmanager aegypt issue 296
- fix kmail kde bug #98463
- fix kmail kde bug #56302
- fix kpgp kde bug #92619
- fix kmail kde bug #98715

Kdeutils:

- fix klaptop "do not allow to overwrite files outside /proc"
- fix kcalc kde bug #98522
- fix kwalleditor incorrect message error
- fix generate menu (kcmlirc) mdk bug #9775
- fix kloppy device name
- fix kdf kde bug #94774
- fix kgpg shredder icons
- fix klaptop: don't provide "kdeutils" bug found by Pascal Terjan

Mandriva 1275 Published by Philipp Esselbach 0

Updated kdelibs packages are available for Mandrakelinux
_______________________________________________________________________

Mandrakelinux Security Update Advisory
_______________________________________________________________________

Package name: kdelibs
Advisory ID: MDKSA-2005:045
Date: February 17th, 2005

Affected versions: 10.0, 10.1, Corporate 3.0
______________________________________________________________________

Problem Description:

A bug in the way kioslave handles URL-encoded newline (%0a) characters before the FTP command was discovered. Because of this, it is possible that a specially crafted URL could be used to execute any ftp command on a remote server, or even send unsolicited email.

As well, Davide Madrisan discovered that dcopidlng created temporary files in an insecure manner.

The updated packages are patched to deal with these issues.

Mandriva 1275 Published by Philipp Esselbach 0

Updated gpdf packages are available for Mandrakelinux
_______________________________________________________________________

Mandrakelinux Security Update Advisory
_______________________________________________________________________

Package name: gpdf
Advisory ID: MDKSA-2005:042
Date: February 17th, 2005

Affected versions: 10.0, 10.1, Corporate 3.0
______________________________________________________________________

Problem Description:

Previous updates to correct integer overflow issues affecting xpdf overlooked certain conditions when built for a 64 bit platform. (formerly CAN-2004-0888). This also affects applications like gpdf, that use embedded versions of xpdf.

The updated packages are patched to deal with these issues.

Mandriva 1275 Published by Philipp Esselbach 0

Updated tetex packages are available for Mandrakelinux
_______________________________________________________________________

Mandrakelinux Security Update Advisory
_______________________________________________________________________

Package name: tetex
Advisory ID: MDKSA-2005:044
Date: February 17th, 2005

Affected versions: 10.0, 10.1, Corporate 3.0
______________________________________________________________________

Problem Description:

Previous updates to correct integer overflow issues affecting xpdf overlooked certain conditions when built for a 64 bit platform. (formerly CAN-2004-0888). This also affects applications like tetex, that use embedded versions of xpdf.

The updated packages are patched to deal with these issues.

Mandriva 1275 Published by Philipp Esselbach 0

Updated xpdf packages are available for Mandrakelinux
_______________________________________________________________________

Mandrakelinux Security Update Advisory
_______________________________________________________________________

Package name: xpdf
Advisory ID: MDKSA-2005:043
Date: February 17th, 2005

Affected versions: 10.0, 10.1, Corporate 3.0,
Corporate Server 2.1
______________________________________________________________________

Problem Description:

Previous updates to correct integer overflow issues affecting xpdf overlooked certain conditions when built for a 64 bit platform. (formerly CAN-2004-0888). This also affects applications that use embedded versions of xpdf.

The updated packages are patched to deal with these issues.

Mandriva 1275 Published by Philipp Esselbach 0

Updated rwho packages are available for Mandrakelinux
_______________________________________________________________________

Mandrakelinux Security Update Advisory
_______________________________________________________________________

Package name: rwho
Advisory ID: MDKSA-2005:039
Date: February 16th, 2005

Affected versions: 10.0, 10.1, Corporate Server 2.1
______________________________________________________________________

Problem Description:

A vulnerability in rwhod was discovered by "Vlad902" that can be abused to crash the listening process (the broadcasting process is not affected). This vulnerability only affects little endian architectures.

The updated packages have been patched to correct the problem.

Mandriva 1275 Published by Philipp Esselbach 0

Updated emacs/xemacs packages are available for Mandrakelinux
_______________________________________________________________________

Mandrakelinux Security Update Advisory
_______________________________________________________________________

Package name: emacs
Advisory ID: MDKSA-2005:038
Date: February 15th, 2005

Affected versions: 10.0, 10.1, Corporate 3.0,
Corporate Server 2.1
______________________________________________________________________

Problem Description:

Max Vozeler discovered several format string vulnerabilities in the movemail utility in Emacs. If a user connects to a malicious POP server, an attacker can execute arbitrary code as the user running emacs.

The updated packages have been patched to correct the problem.

Mandriva 1275 Published by Philipp Esselbach 0

Updated mailman packages are available for Mandrakelinux
_______________________________________________________________________

Mandrakelinux Security Update Advisory
_______________________________________________________________________

Package name: mailman
Advisory ID: MDKSA-2005:037
Date: February 14th, 2005

Affected versions: 10.0, 10.1, Corporate 3.0,
Corporate Server 2.1
______________________________________________________________________

Problem Description:

A vulnerability was discovered in Mailman, which allows a remote directory traversal exploit using URLs of the form ".../....///" to access private Mailman configuration data.

The vulnerability lies in the Mailman/Cgi/private.py file.

Updated packages correct this issue.

Mandriva 1275 Published by Philipp Esselbach 0

A press release from Mandrakesoft:

World's first real-time Linux system for parallel computing based on Itanium:registered: 2 processor.

Moreno Valley, CA; Paris, France; February 14th 2005. Mandrakesoft announced today the release of the first Linux system capable of real-time computing on Itanium:registered: 2 based parallel computing platforms (Symmetric Multiprocessing and cluster computing). Developed for the "ITEA-HYADES" research project which is intended to adapt standard technology for applications that require real-time response, associated with heavy, parallel computations, the new system has already shown its capabilities in two innovating research applications. The new system will be marketed through Mandrakesoft's services branch.

Mandriva 1275 Published by Philipp Esselbach 0

Updated cpio packages are available for Mandrakelinux 10.1
_______________________________________________________________________

Mandrakelinux Security Update Advisory
_______________________________________________________________________

Package name: cpio
Advisory ID: MDKSA-2005:032-1
Date: February 11th, 2005
Original Advisory Date: February 10th, 2005
Affected versions: 10.1
______________________________________________________________________

Problem Description:

A vulnerability in cpio was discovered where cpio would create world- writeable files when used in -o/--create mode and giving an output file (with -O). This would allow any user to modify the created cpio archive. The updated packages have been patched so that cpio now respects the current umask setting of the user.

Update:

The updated cpio packages for 10.1, while they would install with urpmi on the commandline, would not install via rpmdrake. The updated packages correct that.

Mandriva 1275 Published by Philipp Esselbach 0

Updated MySQL packages are available for Mandrakelinux
_______________________________________________________________________

Mandrakelinux Security Update Advisory
_______________________________________________________________________

Package name: MySQL
Advisory ID: MDKSA-2005:036
Date: February 10th, 2005

Affected versions: 10.0, 10.1, Corporate 3.0,
Corporate Server 2.1
______________________________________________________________________

Problem Description:

A temporary file vulnerability in the mysqlaccess script in MySQL was discovered by Javier Fernandez-Sanguino Pena. This flaw could allow an unprivileged user to let root overwrite arbitrary files via a symlink attack. It could also be used to view the contents of a temporary file which could contain sensitive information.

The updated packages have been patched to prevent these problems.

Mandriva 1275 Published by Philipp Esselbach 0

Updated python packages are available for Mandrakelinux
_______________________________________________________________________

Mandrakelinux Security Update Advisory
_______________________________________________________________________

Package name: python
Advisory ID: MDKSA-2005:035
Date: February 10th, 2005

Affected versions: 10.0, 10.1, 9.2, Corporate 3.0,
Corporate Server 2.1
______________________________________________________________________

Problem Description:

A flaw in the python language was found by the development team. The SimpleXMLRPCServer library module could permit remote attackers unintended access to internals of the registered object or it's module, or possibly even other modules. This only affects python XML-RPC servers that use the register_instance() method to register an object without a _dispatch() method. Servers that only use the register_function() method are not affected.

The updated packages have been patched to prevent these problems.

Mandriva 1275 Published by Philipp Esselbach 0

A Squid security update is available for Mandrakelinux
_______________________________________________________________________

Mandrakelinux Security Update Advisory
_______________________________________________________________________

Package name: squid
Advisory ID: MDKSA-2005:034
Date: February 10th, 2005

Affected versions: 10.0, 10.1, 9.2, Corporate 3.0,
Corporate Server 2.1
______________________________________________________________________

Problem Description:

More vulnerabilities were discovered in the squid server:

The LDAP handling of search filters was inadequate which could be abused to allow logins using severial variants of a single login name, possibly bypassing explicit access controls (CAN-2005-0173).

Minor problems in the HTTP header parsing code that could be used for cache poisoning (CAN-2005-0174 and CAN-2005-0175).

A buffer overflow in the WCCP handling code allowed remote attackers to cause a Denial of Service and could potentially allow for the execution of arbitrary code by using a long WCCP packet.

The updated packages have been patched to prevent these problems.

Mandriva 1275 Published by Philipp Esselbach 0

Updated enscript packages are available for Mandrakelinux
_______________________________________________________________________

Mandrakelinux Security Update Advisory
_______________________________________________________________________

Package name: enscript
Advisory ID: MDKSA-2005:033
Date: February 10th, 2005

Affected versions: 10.0, 10.1, Corporate 3.0,
Corporate Server 2.1
______________________________________________________________________

Problem Description:

A vulnerability in the enscript program's handling of the epsf command used to insert inline EPS file into a document was found. An attacker could create a carefully crafted ASCII file which would make used of the epsf pipe command in such a way that it could execute arbitrary commands if the file was opened with enscript (CAN-2004-1184).

Additionally, flaws were found in enscript that could be abused by executing enscript with carefully crafted command-line arguments. These flaws only have a security impact if enscript is executed by other programs and passed untrusted data from remote users (CAN-2004-1185 and CAN-2004-1186).

The updated packages have been patched to prevent these problems.

Mandriva 1275 Published by Philipp Esselbach 0

Updated cpio packages are available for Mandrakelinux
_______________________________________________________________________

Mandrakelinux Security Update Advisory
_______________________________________________________________________

Package name: cpio
Advisory ID: MDKSA-2005:032
Date: February 10th, 2005

Affected versions: 10.0, 10.1, 9.2, Corporate 3.0,
Corporate Server 2.1
______________________________________________________________________

Problem Description:

A vulnerability in cpio was discovered where cpio would create world- writeable files when used in -o/--create mode and giving an output file (with -O). This would allow any user to modify the created cpio archive. The updated packages have been patched so that cpio now respects the current umask setting of the user.

Mandriva 1275 Published by Philipp Esselbach 0

An updated drakxtools package is available for Mandrakelinux 10.1
_______________________________________________________________________

Mandrakelinux Update Advisory
_______________________________________________________________________

Package name: drakxtools
Advisory ID: MDKA-2005:009
Date: February 10th, 2005

Affected versions: 10.1
______________________________________________________________________

Problem Description:

Several new bugs have been identified and corrected in the draktools package:

- drakbackup (stew):
o custom cron setup (#13056)
o directories with spaces (#12861)
o perms too relaxed on tarballs
- drakconnect: fix capi kernel drivers installation (blino)
- drakfirewall: fix samba port range syntax (blino)
- localedrake: do not localize ja on console (funda wang)
- fix starting network in drakx-finish-install

Mandriva 1275 Published by Philipp Esselbach 0

Updated perl packages are available for Mandrakelinux
_______________________________________________________________________

Mandrakelinux Security Update Advisory
_______________________________________________________________________

Package name: perl
Advisory ID: MDKSA-2005:031
Date: February 8th, 2005

Affected versions: 10.0, 10.1, 9.2, Corporate 3.0,
Corporate Server 2.1
______________________________________________________________________

Problem Description:

Jeroen van Wolffelaar discovered that the rmtree() function in the perl File::Path module would remove directories in an insecure manner which could lead to the removal of arbitrary files and directories via a symlink attack (CAN-2004-0452).

Trustix developers discovered several insecure uses of temporary files in many modules which could allow a local attacker to overwrite files via symlink attacks (CAN-2004-0976).

"KF" discovered two vulnerabilities involving setuid-enabled perl scripts. By setting the PERLIO_DEBUG environment variable and calling an arbitrary setuid-root perl script, an attacker could overwrite arbitrary files with perl debug messages (CAN-2005-0155). As well, calling a setuid-root perl script with a very long path would cause a buffer overflow if PERLIO_DEBUG was set, which could be exploited to execute arbitrary files with root privileges (CAN-2005-0156).

The provided packages have been patched to resolve these problems.

Mandriva 1275 Published by Philipp Esselbach 0

Updated perl-DBI packages are available for Mandrakelinux
_______________________________________________________________________

Mandrakelinux Security Update Advisory
_______________________________________________________________________

Package name: perl-DBI
Advisory ID: MDKSA-2005:030
Date: February 8th, 2005

Affected versions: 10.0, 10.1, 9.2, Corporate 3.0,
Corporate Server 2.1
______________________________________________________________________

Problem Description:

Javier Fernandez-Sanguino Pena disovered the perl5 DBI library created a temporary PID file in an insecure manner, which could be exploited by a malicious user to overwrite arbitrary files owned by the user executing the parts of the library.

The updated packages have been patched to prevent these problems.