%package null null-dummy Update: Mon Sep 26 16:39:54 2011 Importance: bugfix ID: MDVA-2011:040 URL: http://www.mandriva.com/security/advisories?name=MDVA-2011:040 %pre This is a test to evaluate if all works as it should. This advisory (MDVA-2011:040) will be overwritten in the coming days. %description Dummy package. %package lib64openssl1.0.0 lib64openssl-devel lib64openssl-engines1.0.0 lib64openssl-static-devel openssl Update: Wed Sep 28 16:40:24 2011 Importance: security ID: MDVSA-2011:137 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2011:137 %pre Multiple vulnerabilities has been discovered and corrected in openssl: The elliptic curve cryptography (ECC) subsystem in OpenSSL 1.0.0d and earlier, when the Elliptic Curve Digital Signature Algorithm (ECDSA) is used for the ECDHE_ECDSA cipher suite, does not properly implement curves over binary fields, which makes it easier for context-dependent attackers to determine private keys via a timing attack and a lattice calculation (CVE-2011-1945). crypto/x509/x509_vfy.c in OpenSSL 1.0.x before 1.0.0e does not initialize certain structure members, which makes it easier for remote attackers to bypass CRL validation by using a nextUpdate value corresponding to a time in the past (CVE-2011-3207). The ephemeral ECDH ciphersuite functionality in OpenSSL 0.9.8 through 0.9.8s and 1.0.x before 1.0.0e does not ensure thread safety during processing of handshake messages, which allows remote attackers to cause a denial of service (application crash) via out-of-order messages that violate the TLS protocol (CVE-2011-3210). Packages for 2009.0 are provided as of the Extended Maintenance Program. Please visit this link to learn more: http://store.mandriva.com/product_info.php?cPath=149&products_id=490 The updated packages have been patched to correct these issues. %description The openssl certificate management tool and the shared libraries that provide various encryption and decription algorithms and protocols, including DES, RC4, RSA and SSL. %package shotwell Update: Wed Sep 28 17:36:25 2011 Importance: bugfix ID: MDVA-2011:040 URL: http://www.mandriva.com/security/advisories?name=MDVA-2011:040 %pre The export function to Piwigo CMS doesn't work because of a file (present in the Shotwell tarball) missing in the shotwell package in Mandriva. %description Shotwell is a digital photo organizer designed for the GNOME desktop environment. It allows you to import photos from disk or camera, organize them in various ways, view them in full-window or fullscreen mode, and export them to share with others. %package draksnapshot Update: Wed Sep 28 17:37:25 2011 Importance: bugfix ID: MDVA-2011:041 URL: http://www.mandriva.com/security/advisories?name=MDVA-2011:041 %pre This update removes system calls to haldaemon which is deprecated upstream: http://www.freedesktop.org/wiki/Software/hal %description This is a backup program that uses rsync to take backup snapshots of filesystems. It uses hard links to save space on disk. %package rpmdrake Update: Wed Sep 28 17:38:23 2011 Importance: bugfix ID: MDVA-2011:042 URL: http://www.mandriva.com/security/advisories?name=MDVA-2011:042 %pre Rpmdrake parses package names with hyphen between release and disttag incorrectly. It does not seem to affect functionality, but package list is displayed wrong: release number is placed in Version column and version number is not separated from package name. %description This package contains the Mandriva graphical software manipulation tools. Rpmdrake provides a simple interface that makes it easy to install and remove software. MandrivaUpdate is a single-purpose application for keeping your system up to date with the latest official updates. There is also a tool for configuring package sources (medias), which can be run independently or accessed from within rpmdrake. %package knetworkmanager-common knetworkmanager-openvpn knetworkmanager-pptp knetworkmanager-vpnc lib64knetworkmanager-devel lib64knmclient4 lib64knminternals4 lib64knm_nm lib64knmservice4 lib64knmui4 lib64solidcontrolfuture plasma-applet-networkmanagement Update: Wed Sep 28 17:54:43 2011 Importance: bugfix ID: MDVA-2011:043 URL: http://www.mandriva.com/security/advisories?name=MDVA-2011:043 %pre this update to fixes broken PPPoE settings on knetworkmanager. %description KNetworkManager is a system tray applet for controlling network connections on systems that use the NetworkManager daemon. %package drakconf drakconf-icons Update: Wed Sep 28 18:08:41 2011 Importance: bugfix ID: MDVA-2011:044 URL: http://www.mandriva.com/security/advisories?name=MDVA-2011:044 %pre It was discovered that the autologin feature did not work properly with KDE. The updated packages addresses this problem. %description drakconf includes the Mandriva Linux Control Center which is an interface to multiple utilities from DrakXtools. %package dumpcap lib64wireshark1 lib64wireshark-devel rawshark tshark wireshark wireshark-tools Update: Wed Sep 28 18:46:11 2011 Importance: security ID: MDVSA-2011:138 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2011:138 %pre This advisory updates wireshark to the latest version (1.6.2), fixing several security issues: Untrusted search path vulnerability in Wireshark 1.4.x before 1.4.9 and 1.6.x before 1.6.2 allows local users to gain privileges via a Trojan horse Lua script in an unspecified directory (CVE-2011-3360). The csnStreamDissector function in epan/dissectors/packet-csn1.c in the CSN.1 dissector in Wireshark 1.6.x before 1.6.2 does not initialize a certain structure member, which allows remote attackers to cause a denial of service (application crash) via a malformed packet (CVE-2011-3482). Wireshark 1.6.x before 1.6.2 allows remote attackers to cause a denial of service (application crash) via a malformed capture file that leads to an invalid root tvbuff, related to a buffer exception handling vulnerability. (CVE-2011-3483). The unxorFrame function in epan/dissectors/packet-opensafety.c in the OpenSafety dissector in Wireshark 1.6.x before 1.6.2 does not properly validate a certain frame size, which allows remote attackers to cause a denial of service (loop and application crash) via a malformed packet (CVE-2011-3484). The updated packages have been upgraded to the latest 1.6.x version (1.6.2) which is not vulnerable to these issues. %description Wireshark is a network traffic analyzer for Unix-ish operating systems. It is based on GTK+, a graphical user interface library, and libpcap, a packet capture and filtering library. Wireshark is a fork of Ethereal(tm) %package firefox firefox-af firefox-ar firefox-ast firefox-be firefox-bg firefox-bn firefox-br firefox-bs firefox-ca firefox-cs firefox-cy firefox-da firefox-de firefox-devel firefox-el firefox-en_GB firefox-eo firefox-es_AR firefox-es_ES firefox-et firefox-eu firefox-fa firefox-fi firefox-fr firefox-fy firefox-ga_IE firefox-gd firefox-gl firefox-gu_IN firefox-he firefox-hi firefox-hr firefox-hu firefox-hy firefox-id firefox-is firefox-it firefox-ja firefox-kk firefox-kn firefox-ko firefox-ku firefox-lg firefox-lt firefox-lv firefox-mai firefox-mk firefox-ml firefox-mr firefox-nb_NO firefox-nl firefox-nn_NO firefox-nso firefox-or firefox-pa_IN firefox-pl firefox-pt_BR firefox-pt_PT firefox-ro firefox-ru firefox-si firefox-sk firefox-sl firefox-sq firefox-sr firefox-sv_SE firefox-ta firefox-te firefox-th firefox-tr firefox-uk firefox-vi firefox-zh_CN firefox-zh_TW firefox-zu Update: Sat Oct 01 20:47:21 2011 Importance: security ID: MDVSA-2011:141 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2011:141 %pre Security issues were identified and fixed in mozilla firefox and thunderbird: Mozilla Firefox before 3.6.23 and 4.x through 6, Thunderbird before 7.0, and SeaMonkey before 2.4 do not prevent the starting of a download in response to the holding of the Enter key, which allows user-assisted remote attackers to bypass intended access restrictions via a crafted web site (CVE-2011-2372). Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.6.23 and 4.x through 6, Thunderbird before 7.0, and SeaMonkey before 2.4 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors (CVE-2011-2995). Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 6, Thunderbird before 7.0, and SeaMonkey before 2.4 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors (CVE-2011-2997). Mozilla Firefox before 3.6.23 and 4.x through 5, Thunderbird before 6.0, and SeaMonkey before 2.3 do not properly handle location as the name of a frame, which allows remote attackers to bypass the Same Origin Policy via a crafted web site, a different vulnerability than CVE-2010-0170 (CVE-2011-2999). Mozilla Firefox before 3.6.23 and 4.x through 6, Thunderbird before 7.0, and SeaMonkey before 2.4 do not properly handle HTTP responses that contain multiple Location, Content-Length, or Content-Disposition headers, which makes it easier for remote attackers to conduct HTTP response splitting attacks via crafted header values (CVE-2011-3000). Mozilla Firefox 4.x through 6, Thunderbird before 7.0, and SeaMonkey before 2.4 do not prevent manual add-on installation in response to the holding of the Enter key, which allows user-assisted remote attackers to bypass intended access restrictions via a crafted web site that triggers an unspecified internal error (CVE-2011-3001). Almost Native Graphics Layer Engine (ANGLE), as used in Mozilla Firefox before 7.0 and SeaMonkey before 2.4, does not validate the return value of a GrowAtomTable function call, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors that trigger a memory-allocation error and a resulting buffer overflow (CVE-2011-3002). Mozilla Firefox before 7.0 and SeaMonkey before 2.4 allow remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via an unspecified WebGL test case that triggers a memory-allocation error and a resulting out-of-bounds write operation (CVE-2011-3003). The JSSubScriptLoader in Mozilla Firefox 4.x through 6 and SeaMonkey before 2.4 does not properly handle XPCNativeWrappers during calls to the loadSubScript method in an add-on, which makes it easier for remote attackers to gain privileges via a crafted web site that leverages certain unwrapping behavior (CVE-2011-3004). Use-after-free vulnerability in Mozilla Firefox 4.x through 6, Thunderbird before 7.0, and SeaMonkey before 2.4 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted OGG headers in a .ogg file (CVE-2011-3005). YARR, as used in Mozilla Firefox before 7.0, Thunderbird before 7.0, and SeaMonkey before 2.4, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted JavaScript (CVE-2011-3232). Integer underflow in Mozilla Firefox 3.6.x before 3.6.23 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via JavaScript code containing a large RegExp expression (CVE-2011-3867). %description Localizations for Firefox web browser. %package mozilla-thunderbird mozilla-thunderbird-ar mozilla-thunderbird-ca mozilla-thunderbird-cs mozilla-thunderbird-da mozilla-thunderbird-de mozilla-thunderbird-en_GB mozilla-thunderbird-enigmail mozilla-thunderbird-enigmail-ar mozilla-thunderbird-enigmail-ca mozilla-thunderbird-enigmail-cs mozilla-thunderbird-enigmail-de mozilla-thunderbird-enigmail-el mozilla-thunderbird-enigmail-es mozilla-thunderbird-enigmail-fi mozilla-thunderbird-enigmail-fr mozilla-thunderbird-enigmail-it mozilla-thunderbird-enigmail-ja mozilla-thunderbird-enigmail-ko mozilla-thunderbird-enigmail-nb mozilla-thunderbird-enigmail-nl mozilla-thunderbird-enigmail-pl mozilla-thunderbird-enigmail-pt mozilla-thunderbird-enigmail-pt_BR mozilla-thunderbird-enigmail-ru mozilla-thunderbird-enigmail-sl mozilla-thunderbird-enigmail-sv mozilla-thunderbird-enigmail-tr mozilla-thunderbird-enigmail-vi mozilla-thunderbird-enigmail-zh_CN mozilla-thunderbird-enigmail-zh_TW mozilla-thunderbird-es_AR mozilla-thunderbird-es_ES mozilla-thunderbird-et mozilla-thunderbird-eu mozilla-thunderbird-fi mozilla-thunderbird-fr mozilla-thunderbird-fy mozilla-thunderbird-ga mozilla-thunderbird-gd mozilla-thunderbird-gl mozilla-thunderbird-he mozilla-thunderbird-hu mozilla-thunderbird-is mozilla-thunderbird-it mozilla-thunderbird-ja mozilla-thunderbird-ko mozilla-thunderbird-lightning mozilla-thunderbird-lt mozilla-thunderbird-nb_NO mozilla-thunderbird-nl mozilla-thunderbird-nn_NO mozilla-thunderbird-pl mozilla-thunderbird-pt_BR mozilla-thunderbird-pt_PT mozilla-thunderbird-ru mozilla-thunderbird-si mozilla-thunderbird-sk mozilla-thunderbird-sl mozilla-thunderbird-sq mozilla-thunderbird-sv_SE mozilla-thunderbird-tr mozilla-thunderbird-uk mozilla-thunderbird-zh_TW nsinstall Update: Sat Oct 01 21:15:56 2011 Importance: security ID: MDVSA-2011:142 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2011:142 %pre Security issues were identified and fixed in mozilla firefox and thunderbird: Mozilla Firefox before 3.6.23 and 4.x through 6, Thunderbird before 7.0, and SeaMonkey before 2.4 do not prevent the starting of a download in response to the holding of the Enter key, which allows user-assisted remote attackers to bypass intended access restrictions via a crafted web site (CVE-2011-2372). Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.6.23 and 4.x through 6, Thunderbird before 7.0, and SeaMonkey before 2.4 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors (CVE-2011-2995). Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 6, Thunderbird before 7.0, and SeaMonkey before 2.4 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors (CVE-2011-2997). Mozilla Firefox before 3.6.23 and 4.x through 6, Thunderbird before 7.0, and SeaMonkey before 2.4 do not properly handle HTTP responses that contain multiple Location, Content-Length, or Content-Disposition headers, which makes it easier for remote attackers to conduct HTTP response splitting attacks via crafted header values (CVE-2011-3000). Mozilla Firefox 4.x through 6, Thunderbird before 7.0, and SeaMonkey before 2.4 do not prevent manual add-on installation in response to the holding of the Enter key, which allows user-assisted remote attackers to bypass intended access restrictions via a crafted web site that triggers an unspecified internal error (CVE-2011-3001). Use-after-free vulnerability in Mozilla Firefox 4.x through 6, Thunderbird before 7.0, and SeaMonkey before 2.4 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted OGG headers in a .ogg file (CVE-2011-3005). YARR, as used in Mozilla Firefox before 7.0, Thunderbird before 7.0, and SeaMonkey before 2.4, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted JavaScript (CVE-2011-3232). %description Mozilla Thunderbird is a full-featured email, RSS and newsgroup client that makes emailing safer, faster and easier than ever before. %package nspluginwrapper nspluginwrapper-i386 Update: Sat Oct 01 22:23:25 2011 Importance: bugfix ID: MDVA-2011:045 URL: http://www.mandriva.com/security/advisories?name=MDVA-2011:045 %pre This is a bugfix and maintenance release that upgrades nspluginwrapper to the latest version (1.4.4) which provides numerous fixes for firefox 3.6 and later. %description nspluginwrapper makes it possible to use Netscape 4 compatible plugins compiled for linux/i386 into Mozilla for another architecture, e.g. x86_64. This package consists in: * npviewer: the plugin viewer * npwrapper.so: the browser-side plugin * nspluginwrapper: a tool to manage plugins installation and update %package drakx-net drakx-net-applet drakx-net-text libdrakx-net Update: Wed Oct 05 09:20:59 2011 Importance: bugfix ID: MDVA-2011:047 URL: http://www.mandriva.com/security/advisories?name=MDVA-2011:047 %pre The network icon doesn't report the network status correctly with a kernel > 2.6.38 (#64108). Internet can't be shared when the firewall is off but it has been previously enabled for the adapter. Drakgw could not properly determine the firewall status, this update fixes this issue (#). %description This package contains the Mandriva network tools. net_applet: applet to check network connection %package qemu qemu-img Update: Wed Oct 05 09:49:16 2011 Importance: bugfix ID: MDVA-2011:048 URL: http://www.mandriva.com/security/advisories?name=MDVA-2011:048 %pre There is a missing qemu dependence in Mandriva 2011. By adding this dependency, this update fixes the bug. The version 0.15.0 was compiled without png support, this way, it was not supporting some VNC client. %description QEMU is a FAST! processor emulator. By using dynamic translation it achieves a reasonnable speed while being easy to port on new host CPUs. QEMU has two operating modes: * User mode emulation. In this mode, QEMU can launch Linux processes compiled for one CPU on another CPU. Linux system calls are converted because of endianness and 32/64 bit mismatches. Wine (Windows emulation) and DOSEMU (DOS emulation) are the main targets for QEMU. * Full system emulation. In this mode, QEMU emulates a full system, including a processor and various peripherials. Currently, it is only used to launch an x86 Linux kernel on an x86 Linux system. It enables easier testing and debugging of system code. It can also be used to provide virtual hosting of several virtual PC on a single server. %package hostapd Update: Wed Oct 05 10:04:51 2011 Importance: bugfix ID: MDVA-2011:049 URL: http://www.mandriva.com/security/advisories?name=MDVA-2011:049 %pre The hostapd package contains a very old configuration file, so many new features including IEEE 802.11n support are disabled. %description Hostapd is an optional user space component for Host AP driver. It adds more features to the basic IEEE 802.11 management included in the kernel driver: using external RADIUS authentication server for MAC address based access control, IEEE 802.1X Authenticator and dynamic WEP keying, RADIUS accounting. %package lib64openbox27 lib64openbox-devel openbox Update: Wed Oct 05 12:18:57 2011 Importance: bugfix ID: MDVA-2011:050 URL: http://www.mandriva.com/security/advisories?name=MDVA-2011:050 %pre Openbox package is a light window manager, using mant DE, such LXDE. Version in Mandriva - 3.4.11.2 - was too old (it's released on 2011.02.08) and have a lot bugs, for example lost focus in Lazarus code window after program running, problem with windows arranges and other. New version fix many problems (see changlog there: http://openbox.org/wiki/Openbox:Changelog#3.5.0) and improve WM support in LXDE and other light DE and perfomance. Also default theme changed to Elementary as in other Mandriva DE. %description Openbox is a window manager for the X11 windowing system. It currently runs on a large list of platforms. It was originally based on blackbox and currently remains very similar, even using blackbox styles (with available extensions) for its themeing. Openbox is the spawn of a number of previous blackbox users/hackers. Being overall pleased with the window manager, but feeling left unable to contribute, this project was born.The Openbox project is developed, maintained, and contributed to by these individuals. %package rpmdrake Update: Wed Oct 05 12:24:44 2011 Importance: bugfix ID: MDVA-2011:051 URL: http://www.mandriva.com/security/advisories?name=MDVA-2011:051 %pre Previous rpmdrake update lead to regression in unofficial repositories support. The package name was not displayed if revision number contained letters (e. g. some packages from PLF), such packages are not correctly shown in search results. %description This package contains the Mandriva graphical software manipulation tools. Rpmdrake provides a simple interface that makes it easy to install and remove software. MandrivaUpdate is a single-purpose application for keeping your system up to date with the latest official updates. There is also a tool for configuring package sources (medias), which can be run independently or accessed from within rpmdrake. %package drakx-net drakx-net-applet drakx-net-text libdrakx-net Update: Thu Oct 06 07:46:09 2011 Importance: bugfix ID: MDVA-2011:052 URL: http://www.mandriva.com/security/advisories?name=MDVA-2011:052 %pre A regression was discovered with the MDVA-2011:047 advisory which caused the crakconnect function stop working properly (#64406). This advisory solves the problem by removing a broken patch (#64108) accidently thought as validated by the QA team. %description This package contains the Mandriva network tools. net_applet: applet to check network connection %package mozilla-thunderbird mozilla-thunderbird-ar mozilla-thunderbird-ca mozilla-thunderbird-cs mozilla-thunderbird-da mozilla-thunderbird-de mozilla-thunderbird-en_GB mozilla-thunderbird-enigmail mozilla-thunderbird-enigmail-ar mozilla-thunderbird-enigmail-ca mozilla-thunderbird-enigmail-cs mozilla-thunderbird-enigmail-de mozilla-thunderbird-enigmail-el mozilla-thunderbird-enigmail-es mozilla-thunderbird-enigmail-fi mozilla-thunderbird-enigmail-fr mozilla-thunderbird-enigmail-it mozilla-thunderbird-enigmail-ja mozilla-thunderbird-enigmail-ko mozilla-thunderbird-enigmail-nb mozilla-thunderbird-enigmail-nl mozilla-thunderbird-enigmail-pl mozilla-thunderbird-enigmail-pt mozilla-thunderbird-enigmail-pt_BR mozilla-thunderbird-enigmail-ru mozilla-thunderbird-enigmail-sl mozilla-thunderbird-enigmail-sv mozilla-thunderbird-enigmail-tr mozilla-thunderbird-enigmail-vi mozilla-thunderbird-enigmail-zh_CN mozilla-thunderbird-enigmail-zh_TW mozilla-thunderbird-es_AR mozilla-thunderbird-es_ES mozilla-thunderbird-et mozilla-thunderbird-eu mozilla-thunderbird-fi mozilla-thunderbird-fr mozilla-thunderbird-fy mozilla-thunderbird-ga mozilla-thunderbird-gd mozilla-thunderbird-gl mozilla-thunderbird-he mozilla-thunderbird-hu mozilla-thunderbird-is mozilla-thunderbird-it mozilla-thunderbird-ja mozilla-thunderbird-ko mozilla-thunderbird-lightning mozilla-thunderbird-lt mozilla-thunderbird-nb_NO mozilla-thunderbird-nl mozilla-thunderbird-nn_NO mozilla-thunderbird-pl mozilla-thunderbird-pt_BR mozilla-thunderbird-pt_PT mozilla-thunderbird-ru mozilla-thunderbird-si mozilla-thunderbird-sk mozilla-thunderbird-sl mozilla-thunderbird-sq mozilla-thunderbird-sv_SE mozilla-thunderbird-tr mozilla-thunderbird-uk mozilla-thunderbird-zh_TW nsinstall Update: Thu Oct 06 15:11:05 2011 Importance: bugfix ID: MDVA-2011:053 URL: http://www.mandriva.com/security/advisories?name=MDVA-2011:053 %pre It was discovered that add-ons could be hidden with thunderbird v7.0. This advisory provides mozilla-thunderbird v7.0.1 where this problem has been fixed. %description Mozilla Thunderbird is a full-featured email, RSS and newsgroup client that makes emailing safer, faster and easier than ever before. %package file lib64magic1 lib64magic-devel lib64magic-static-devel python-magic Update: Fri Oct 07 10:28:36 2011 Importance: bugfix ID: MDVA-2011:054 URL: http://www.mandriva.com/security/advisories?name=MDVA-2011:054 %pre file as shipped in Mandriva 2011 had a broken detection of zip archives. This updates the file package to the new fixed version. %description The file command is used to identify a particular file according to the type of data contained by the file. File can identify many different file types, including ELF binaries, system libraries, RPM packages, and different graphics formats. You should install the file package, since the file command is such a useful utility. %package hplip hplip-doc hplip-gui hplip-hpijs hplip-hpijs-ppds hplip-model-data lib64hpip0 lib64hpip0-devel lib64sane-hpaio1 Update: Fri Oct 07 10:43:02 2011 Importance: bugfix ID: MDVA-2011:055 URL: http://www.mandriva.com/security/advisories?name=MDVA-2011:055 %pre In all recent Mandriva releases hpijs driver does not work because PPD files contain a link to foomatic-rip-hplip filter that is not installed. %description This is the HP driver package to supply Linux support for most Hewlett-Packard DeskJet, LaserJet, PSC, OfficeJet, and PhotoSmart printers and all-in-one peripherals (also known as Multi-Function Peripherals or MFPs), which can print, scan, copy, fax, and/or access flash memory cards. It is work in progress, but printing, scanning, memory card access, ink/toner/battery/consumable level checking, and inkjet printer maintenance are supported on most models, when either connected to the USB or LAN (built-in interfaces or selected HP JetDirect models) on a Linux workstation with CUPS printing system. For status and consumable checking and also for inkjet maintenance there is the graphical tool "hp-toolbox" available (Menu: "System"/"Monitoring"/"HP Printer Toolbox"). %package lib64webkitgtk1.0_0 lib64webkitgtk1.0-devel lib64webkitgtk3.0_0 lib64webkitgtk3.0-devel webkit1.0 webkit1.0-webinspector webkit webkit3.0 webkit3.0-webinspector webkit3 webkit3-gtklauncher webkit3-jsc webkit-gtklauncher webkit-jsc Update: Fri Oct 07 12:58:50 2011 Importance: bugfix ID: MDVA-2011:056 URL: http://www.mandriva.com/security/advisories?name=MDVA-2011:056 %pre Currently some programs using webkit-gtk (e.g. drakconf, midori) crash on startup if total amount of virtual memory is less than about 1,7G (for x86_64). This update is fixes this issue. %description WebKit is an open source web browser engine. %package apache-base apache-devel apache-htcacheclean apache-mod_authn_dbd apache-mod_cache apache-mod_dav apache-mod_dbd apache-mod_deflate apache-mod_disk_cache apache-mod_file_cache apache-mod_ldap apache-mod_mem_cache apache-mod_proxy apache-mod_proxy_ajp apache-mod_proxy_scgi apache-mod_reqtimeout apache-mod_ssl apache-modules apache-mod_userdir apache-mpm-event apache-mpm-itk apache-mpm-peruser apache-mpm-prefork apache-mpm-worker apache-source Update: Sat Oct 08 11:24:32 2011 Importance: security ID: MDVSA-2011:144 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2011:144 %pre A vulnerability has been discovered and corrected in apache: The mod_proxy module in the Apache HTTP Server 1.3.x through 1.3.42, 2.0.x through 2.0.64, and 2.2.x through 2.2.21 does not properly interact with use of (1) RewriteRule and (2) ProxyPassMatch pattern matches for configuration of a reverse proxy, which allows remote attackers to send requests to intranet servers via a malformed URI containing an initial \@ (at sign) character (CVE-2011-3368). Packages for 2009.0 are provided as of the Extended Maintenance Program. Please visit this link to learn more: http://store.mandriva.com/product_info.php?cPath=149&products_id=490 The updated packages have been patched to correct this issue. %description This package contains the main binary of apache, a powerful, full-featured, efficient and freely-available Web server. Apache is also the most popular Web server on the Internet. This version of apache is fully modular, and many modules are available in pre-compiled formats, like PHP and mod_auth_external. This package defaults to a maximum of 128 dynamically loadable modules. This package defaults to a ServerLimit of 1024. You can change these values at RPM build time by using for example: --define 'maxmodules 512' --define 'serverlimit 2048' The package was built to support a maximum of 128 dynamically loadable modules. The package was built with a ServerLimit of 1024. %package lib64xml1 lib64xml1-devel lib64xml2_2 lib64xml2-devel libxml2-python libxml2-utils Update: Sun Oct 09 16:16:23 2011 Importance: security ID: MDVSA-2011:131-1 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2011:131-1 %pre Multiple vulnerabilities has been discovered and corrected in libxml/libxml2: Integer overflow in xpath.c in libxml2 2.6.x through 2.6.32 and 2.7.x through 2.7.8, and libxml 1.8.16 and earlier, allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted XML file that triggers a heap-based buffer overflow when adding a new namespace node, related to handling of XPath expressions (CVE-2011-1944). The updated packages have been patched to correct this issue. Update: Packages were misssing for Mandriva Linux 2011 with the MDVSA-2011:131 advisory which are now being provided. %description This library allows you to manipulate XML files. It includes support for reading, modifying and writing XML and HTML files. There is DTDs support: this includes parsing and validation even with complex DtDs, either at parse time or later once the document has been modified. The output can be a simple SAX stream or and in-memory DOM-like representations. In this case one can use the built-in XPath and XPointer implementation to select subnodes or ranges. A flexible Input/Output mechanism is available, with existing HTTP and FTP modules and combined to a URI library. %package lib64xml2_2 lib64xml2-devel libxml2-python libxml2-utils Update: Sun Oct 09 18:24:53 2011 Importance: security ID: MDVSA-2011:145 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2011:145 %pre Double free vulnerabilities in libxml2 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted XPath expression and via vectors related to XPath handling (CVE-2011-2821, CVE-2011-2834). Packages for 2009.0 are provided as of the Extended Maintenance Program. Please visit this link to learn more: http://store.mandriva.com/product_info.php?cPath=149&products_id=490 The updated packages have been patched to correct these issues. %description This library allows you to manipulate XML files. It includes support for reading, modifying and writing XML and HTML files. There is DTDs support: this includes parsing and validation even with complex DtDs, either at parse time or later once the document has been modified. The output can be a simple SAX stream or and in-memory DOM-like representations. In this case one can use the built-in XPath and XPointer implementation to select subnodes or ranges. A flexible Input/Output mechanism is available, with existing HTTP and FTP modules and combined to a URI library. %package lib64xml2_2 lib64xml2-devel libxml2-python libxml2-utils Update: Sun Oct 09 18:35:19 2011 Importance: security ID: MDVSA-2011:145 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2011:145 %pre Double free vulnerabilities in libxml2 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted XPath expression and via vectors related to XPath handling (CVE-2011-2821, CVE-2011-2834). Packages for 2009.0 are provided as of the Extended Maintenance Program. Please visit this link to learn more: http://store.mandriva.com/product_info.php?cPath=149&products_id=490 The updated packages have been patched to correct these issues. %description This library allows you to manipulate XML files. It includes support for reading, modifying and writing XML and HTML files. There is DTDs support: this includes parsing and validation even with complex DtDs, either at parse time or later once the document has been modified. The output can be a simple SAX stream or and in-memory DOM-like representations. In this case one can use the built-in XPath and XPointer implementation to select subnodes or ranges. A flexible Input/Output mechanism is available, with existing HTTP and FTP modules and combined to a URI library. %package cups cups-common cups-serial lib64cups2 lib64cups2-devel php-cups Update: Mon Oct 10 14:03:39 2011 Importance: security ID: MDVSA-2011:147 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2011:147 %pre A vulnerability has been discovered and corrected in cups: The gif_read_lzw function in filter/image-gif.c in CUPS 1.4.8 and earlier does not properly handle the first code word in an LZW stream, which allows remote attackers to trigger a heap-based buffer overflow, and possibly execute arbitrary code, via a crafted stream, a different vulnerability than CVE-2011-2896 (CVE-2011-3170). The updated packages have been patched to correct this issue. %description The Common Unix Printing System provides a portable printing layer for UNIX(TM) operating systems. It has been developed by Easy Software Products to promote a standard printing solution for all UNIX vendors and users. CUPS provides the System V and Berkeley command-line interfaces. This is the main package needed for CUPS servers (machines where a printer is connected to or which host a queue for a network printer). It can also be used on CUPS clients so that they simply pick up broadcasted printer information from other CUPS servers and do not need to be assigned to a specific CUPS server by an /etc/cups/client.conf file. %package cifs-utils lib64netapi0 lib64netapi-devel lib64smbclient0 lib64smbclient0-devel lib64smbclient0-static-devel lib64smbsharemodes0 lib64smbsharemodes-devel lib64wbclient0 lib64wbclient-devel mount-cifs nss_wins samba-client samba-common samba-doc samba-domainjoin-gui samba-server samba-swat samba-winbind Update: Tue Oct 11 19:53:23 2011 Importance: security ID: MDVSA-2011:148 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2011:148 %pre Multiple vulnerabilities has been discovered and corrected in samba/cifs-utils: smbfs in Samba 3.5.8 and earlier attempts to use (1) mount.cifs to append to the /etc/mtab file and (2) umount.cifs to append to the /etc/mtab.tmp file without first checking whether resource limits would interfere, which allows local users to trigger corruption of the /etc/mtab file via a process with a small RLIMIT_FSIZE value, a related issue to CVE-2011-1089 (CVE-2011-1678). The check_mtab function in client/mount.cifs.c in mount.cifs in smbfs in Samba 3.5.10 and earlier does not properly verify that the (1) device name and (2) mountpoint strings are composed of valid characters, which allows local users to cause a denial of service (mtab corruption) via a crafted string. NOTE: this vulnerability exists because of an incorrect fix for CVE-2010-0547 (CVE-2011-2724). Additionally for Mandriva Linux 2010.2 the cifs-utils package has been upgraded to the 4.8.1 version that brings numerous additional fixes. Packages for 2009.0 are provided as of the Extended Maintenance Program. Please visit this link to learn more: http://store.mandriva.com/product_info.php?cPath=149&products_id=490 The updated packages have been patched to correct these issues. %description Samba provides an SMB server which can be used to provide network services to SMB (sometimes called "Lan Manager") clients, including various versions of MS Windows, OS/2, and other Linux machines. Samba also provides some SMB clients, which complement the built-in SMB filesystem in Linux. Samba uses NetBIOS over TCP/IP (NetBT) protocols and does NOT need NetBEUI (Microsoft Raw NetBIOS frame) protocol. Samba-3.0 features working NT Domain Control capability and includes the SWAT (Samba Web Administration Tool) that allows samba's smb.conf file to be remotely managed using your favourite web browser. For the time being this is being enabled on TCP port 901 via xinetd. SWAT is now included in it's own subpackage, samba-swat. Please refer to the WHATSNEW.txt document for fixup information. This binary release includes encrypted password support. Please read the smb.conf file and ENCRYPTION.txt in the docs directory for implementation details. %package cyrus-imapd cyrus-imapd-devel cyrus-imapd-murder cyrus-imapd-nntp cyrus-imapd-utils perl-Cyrus Update: Fri Oct 14 17:04:32 2011 Importance: security ID: MDVSA-2011:149 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2011:149 %pre Multiple vulnerabilities has been discovered and corrected in cyrus-imapd: Stack-based buffer overflow in the split_wildmats function in nntpd.c in nntpd in Cyrus IMAP Server before 2.3.17 and 2.4.x before 2.4.11 allows remote attackers to execute arbitrary code via a crafted NNTP command (CVE-2011-3208). Secunia Research has discovered a vulnerability in Cyrus IMAPd, which can be exploited by malicious people to bypass certain security restrictions. The vulnerability is caused due to an error within the authentication mechanism of the NNTP server, which can be exploited to bypass the authentication process and execute commands intended for authenticated users by sending an AUTHINFO USER command without a following AUTHINFO PASS command (CVE-2011-3372). Packages for 2009.0 are provided as of the Extended Maintenance Program. Please visit this link to learn more: http://store.mandriva.com/product_info.php?cPath=149&products_id=490 The updated packages have been patched to correct these issues. %description The Cyrus IMAP Server is a scaleable enterprise mail system designed for use from small to large enterprise environments using standards-based technologies. A full Cyrus IMAP implementation allows a seamless mail and bulletin board environment to be set up across multiple servers. It differs from other IMAP server implementations in that it is run on "sealed" servers, where users are not normally permitted to log in. The mailbox database is stored in parts of the filesystem that are private to the Cyrus IMAP system. All user access to mail is through software using the IMAP, POP3, or KPOP protocols. TLSv1 and SSL are supported for security. This is the main package, install also the cyrus-imapd-utils package (it contains server administration tools and depends on the perl-Cyrus package). %package lib64xfont1 lib64xfont1-devel lib64xfont1-static-devel Update: Mon Oct 17 15:41:12 2011 Importance: security ID: MDVSA-2011:153 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2011:153 %pre A vulnerability has been discovered and corrected in libxfont: The LZW decompressor in (1) the BufCompressedFill function in fontfile/decompress.c in X.Org libXfont before 1.4.4 and (2) compress/compress.c in 4.3BSD, as used in zopen.c in OpenBSD before 3.8, FreeBSD, NetBSD, FreeType 2.1.9, and other products, does not properly handle code words that are absent from the decompression table when encountered, which allows context-dependent attackers to trigger an infinite loop or a heap-based buffer overflow, and possibly execute arbitrary code, via a crafted compressed stream, a related issue to CVE-2006-1168 and CVE-2011-2896 (CVE-2011-2895). The updated packages have been patched to correct this issue. %description X font Library %package systemtap Update: Mon Oct 17 17:09:46 2011 Importance: security ID: MDVSA-2011:155 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2011:155 %pre Multiple vulnerabilities has been discovered and corrected in systemtap: SystemTap 1.4 and earlier, when unprivileged (aka stapusr) mode is enabled, allows local users to cause a denial of service (divide-by-zero error and OOPS) via a crafted ELF program with DWARF expressions that are not properly handled by a stap script that performs context variable access (CVE-2011-1769). SystemTap 1.4, when unprivileged (aka stapusr) mode is enabled, allows local users to cause a denial of service (divide-by-zero error and OOPS) via a crafted ELF program with DWARF expressions that are not properly handled by a stap script that performs stack unwinding (aka backtracing) (CVE-2011-1781). The updated packages have been patched to correct these issues. %description SystemTap provides free software (GPL) infrastructure to simplify the gathering of information about the running Linux system. This assists diagnosis of a performance or functional problem. SystemTap eliminates the need for the developer to go through the tedious and disruptive instrument, recompile, install, and reboot sequence that may be otherwise required to collect data. SystemTap provides a simple command line interface and scripting language for writing instrumentation for a live running kernel. We are publishing samples, as well as enlarging the internal "tapset" script library to aid reuse and abstraction. We also plan to support probing userspace applications. We are investigating interfacing Systemtap with similar tools such as Frysk, Oprofile and LTT. Current project members include Red Hat, IBM, Intel, and Hitachi. %package timezone timezone-java Update: Tue Oct 18 09:41:37 2011 Importance: bugfix ID: MDVA-2011:058 URL: http://www.mandriva.com/security/advisories?name=MDVA-2011:058 %pre Timezone is a package that contains data files with rules for various timezones around the world. In autumn 2011 Russia, Belarus and Ukraine drop transition on winter time. Palestine suspends DST during Ramadan in 2011. Gaza and West Bank split in 2011. West Bank is tracked in the timezone Asia/Hebron. This package fix this. Also we fix some error on UK and China timezone definition. %description This package contains data files with rules for various timezones around the world. %package b43-fwcutter Update: Wed Oct 19 07:16:19 2011 Importance: bugfix ID: MDVA-2011:059 URL: http://www.mandriva.com/security/advisories?name=MDVA-2011:059 %pre The b43-fwcutter version in 2011 Release is outdated and can not extract the firmware for some new Broadcom chips, as described in http://wiki.mandriva.com/en/Installing_wireless_network_cards_using_the_b43_driver#Installing_the_firmware_on_Mandriva_Linux_2011_or_higher This update releases a new version, leading firmware extraction to work fine again. %description Fwcutter allows you to extract the firmware required for Broadcom 43xx chips out of the .o files available with the card or on the Internet. Not all versions of the firmwares are supported by this tool. You can list supported firmwares with : b43-fwcutter -l Depending on your chip, you will need a version 3 or 4 firmware. Useful reading and links to firmwares that can be extracted are available at http://linuxwireless.org/en/users/Drivers/b43 Extract (as root) with : b43-fwcutter -w /lib/firmware wl_apsta_mimo.o OR b43-fwcutter -w /lib/firmware wl_apsta.o (for LP-PHY cards like BCM4312 only!) It will create files directly at the required place (in either b43legacy or b43 subdirectory). %package laptop-mode-tools Update: Wed Oct 19 07:18:27 2011 Importance: bugfix ID: MDVA-2011:060 URL: http://www.mandriva.com/security/advisories?name=MDVA-2011:060 %pre This updates laptop-mode-tools from version 1.55 to 1.57 This release also contains two patches: - one is to handle kernel 3.x serie since the kernel release detection logic was broken otherwise laptop-mode don't start at all - the brcmsmac has no power management so it has been blacklisted to avoid error reports when starting laptop-mode %description Userland scripts to control "laptop mode". Laptop mode is a Linux kernel feature that allows your laptop to save considerable power, by allowing the hard drive to spin down for longer periods of time. This package contains the userland scripts that are needed to enable laptop mode. %package systemd systemd-gtk systemd-sysvinit systemd-units Update: Thu Oct 20 06:38:35 2011 Importance: bugfix ID: MDVA-2011:061 URL: http://www.mandriva.com/security/advisories?name=MDVA-2011:061 %pre This update fixes a issue who leads 'rc-local' systemd service to some times not being started properly, leading to a non executed rc.local. %description systemd is a system and session manager for Linux, compatible with SysV and LSB init scripts. systemd provides aggressive parallelization capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, keeps track of processes using Linux cgroups, supports snapshotting and restoring of the system state, maintains mount and automount points and implements an elaborate transactional dependency-based service control logic. It can work as a drop-in replacement for sysvinit. %package gcc4.2 gcc4.2-c++ gcc4.2-cpp Update: Thu Oct 20 07:09:34 2011 Importance: bugfix ID: MDVA-2011:062 URL: http://www.mandriva.com/security/advisories?name=MDVA-2011:062 %pre gcc4.2-c++ compatibility package had a installation conflict problem, and could not resolve dependencies on a Mandriva 2011 system. The update corrects the problem. %description A compiler aimed at integrating all the optimizations and features necessary for a high-performance and stable development environment. This package is required for all other GCC compilers, namely C++, Fortran 95, Objective C, Java and Ada 95. %package coreutils coreutils-doc Update: Thu Oct 20 07:14:57 2011 Importance: bugfix ID: MDVA-2011:063 URL: http://www.mandriva.com/security/advisories?name=MDVA-2011:063 %pre In fresh Mandriva 2011 installation manpages for coreutils are missing because coreutils-doc package is not installed. This updated suggests coreutils-doc for coreutils, which installs the expected manpages. %description This package is the union of the old GNU fileutils, sh-utils, and textutils packages. These tools are the GNU versions of common useful and popular file & text utilities which are used for: - file management - shell scripts - modifying text file (spliting, joining, comparing, modifying, ...) Most of these programs have significant advantages over their Unix counterparts, such as greater speed, additional options, and fewer arbitrary limits. %package freetype2-demos lib64freetype6 lib64freetype6-devel lib64freetype6-static-devel Update: Fri Oct 21 09:49:52 2011 Importance: security ID: MDVSA-2011:157 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2011:157 %pre A vulnerability has been discovered and corrected in freetype2: FreeType allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted font (CVE-2011-3256). A regression was found in freetype2 in Mandriva Enterprise Server 5 that caused ugly font rendering with firefox (#63892). Additionally, improvements conserning the LZW handling (as noted in the freetype-2.4.7 version) was added. The updated packages have been patched to correct these issues. %description The FreeType2 engine is a free and portable TrueType font rendering engine. It has been developed to provide TT support to a great variety of platforms and environments. Note that FreeType2 is a library, not a stand-alone application, though some utility applications are included %package krb5 krb5-pkinit-openssl krb5-server krb5-server-ldap krb5-workstation lib64krb53 lib64krb53-devel Update: Sat Oct 22 20:24:43 2011 Importance: security ID: MDVSA-2011:159 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2011:159 %pre Multiple vulnerabilities has been found and corrected in krb5: The kdb_ldap plugin in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.9 through 1.9.1, when the LDAP back end is used, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a kinit operation with incorrect string case for the realm, related to the is_principal_in_realm, krb5_set_error_message, krb5_ldap_get_principal, and process_as_req functions (CVE-2011-1527). The krb5_ldap_lockout_audit function in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.8 through 1.8.4 and 1.9 through 1.9.1, when the LDAP back end is used, allows remote attackers to cause a denial of service (assertion failure and daemon exit) via unspecified vectors, related to the locked_check_p function (CVE-2011-1528). The lookup_lockout_policy function in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.8 through 1.8.4 and 1.9 through 1.9.1, when the db2 (aka Berkeley DB) or LDAP back end is used, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via vectors that trigger certain process_as_req errors (CVE-2011-1529). The updated packages have been patched to correct these issues. %description Kerberos V5 is a trusted-third-party network authentication system, which can improve your network's security by eliminating the insecure practice of cleartext passwords. %package lib64ecpg9.0_6 lib64ossp-uuid++16 lib64ossp-uuid16 lib64ossp-uuid_dce16 lib64ossp-uuid-devel lib64pq9.0_5 ossp-uuid perl-OSSP-uuid php-OSSP-uuid postgresql9.0 postgresql9.0-contrib postgresql9.0-devel postgresql9.0-docs postgresql9.0-pl postgresql9.0-plperl postgresql9.0-plpgsql postgresql9.0-plpython postgresql9.0-pltcl postgresql9.0-server postgresql-OSSP-uuid postgresql-OSSP-uuid Update: Mon Oct 24 18:01:27 2011 Importance: security ID: MDVSA-2011:161 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2011:161 %pre A vulnerability was discovered and corrected in postgresql: contrib/pg_crypto's blowfish encryption code could give wrong results on platforms where char is signed (which is most), leading to encrypted passwords being weaker than they should be (CVE-2011-2483). Additionally corrected ossp-uuid packages as well as corrected support in postgresql 9.0.x are being provided for Mandriva Linux 2011. This update provides a solution to this vulnerability. %description OSSP uuid is a ISO-C:1999 application programming interface (API) and corresponding command line interface (CLI) for the generation of DCE 1.1, ISO/IEC 11578:1996 and IETF RFC-4122 compliant Universally Unique Identifier (UUID). It supports DCE 1.1 variant UUIDs of version 1 (time and node based), version 3 (name based, MD5), version 4 (random number based) and version 5 (name based, SHA-1). Additional API bindings are provided for the languages ISO-C++:1998, Perl:5 and PHP:4/5. Optional backward compatibility exists for the ISO-C DCE-1.1 and Perl Data::UUID APIs %package gurpmi urpmi urpmi-dudf urpmi-ldap urpmi-parallel-ka-run urpmi-parallel-ssh Update: Wed Oct 26 09:58:22 2011 Importance: bugfix ID: MDVA-2011:065 URL: http://www.mandriva.com/security/advisories?name=MDVA-2011:065 %pre The kernel uses now /etc/urpmi/inst.list file to teach urpmi to not remove old kernel binaries when doing an update. However the kernel-header package can't be installed for now, see https://qa.mandriva.com/show_bug.cgi?id=64160 and the reason is that this package matches wrongly the regexp in inst.list. Therefore urpmi tries to install the header package while keeping the old one (linux-userspace-headers). This new version of urpmi simply excludes kernel-headers packages from inst.list. %description urpmi is Mandriva Linux's console-based software installation tool. You can use it to install software from the console in the same way as you use the graphical Install Software tool (rpmdrake) to install software from the desktop. urpmi will follow package dependencies -- in other words, it will install all the other software required by the software you ask it to install -- and it's capable of obtaining packages from a variety of media, including the Mandriva Linux installation CD-ROMs, your local hard disk, and remote sources such as web or FTP sites. %package lib64qt3support4 lib64qt4-devel lib64qtclucene4 lib64qtcore4 lib64qtdbus4 lib64qtdeclarative4 lib64qtdesigner4 lib64qtgui4 lib64qthelp4 lib64qtmultimedia4 lib64qtnetwork4 lib64qtopengl4 lib64qtscript4 lib64qtscripttools4 lib64qtsql4 lib64qtsvg4 lib64qttest4 lib64qtwebkit4 lib64qtxml4 lib64qtxmlpatterns4 qt4-accessibility-plugin qt4-assistant qt4-common qt4-database-plugin-mysql qt4-database-plugin-pgsql qt4-database-plugin-sqlite qt4-database-plugin-tds qt4-demos qt4-designer qt4-designer-plugin-qt3support qt4-designer-plugin-webkit qt4-doc qt4-examples qt4-graphicssystems-plugin qt4-linguist qt4-qdoc3 qt4-qmlviewer qt4-qtconfig qt4-qtdbus qt4-qvfb qt4-xmlpatterns Update: Thu Oct 27 15:20:08 2011 Importance: bugfix ID: MDVA-2011:066 URL: http://www.mandriva.com/security/advisories?name=MDVA-2011:066 %pre This update provides the new qt 4.7 bugfixes release. %description Qt is a GUI software toolkit which simplifies the task of writing and maintaining GUI (Graphical User Interface) applications for the X Window System. Qt is written in C++ and is fully object-oriented. This package contains the shared library needed to run Qt applications, as well as the README files for Qt. %package kdelibs4-core kdelibs4-devel lib64katepartinterfaces4 lib64kcmutils4 lib64kde3support4 lib64kdecore5 lib64kdefakes5 lib64kdesu5 lib64kdeui5 lib64kdewebkit5 lib64kdnssd4 lib64kemoticons4 lib64kfile4 lib64khtml5 lib64kidletime4 lib64kimproxy4 lib64kio5 lib64kjs4 lib64kjsapi4 lib64kjsembed4 lib64kmediaplayer4 lib64knewstuff2_4 lib64knewstuff3_4 lib64knotifyconfig4 lib64kntlm4 lib64kparts4 lib64kprintutils4 lib64kpty4 lib64krosscore4 lib64krossui4 lib64ktexteditor4 lib64kunitconversion4 lib64kunittest4 lib64kutils4 lib64nepomuk4 lib64nepomukquery4 lib64nepomukutils4 lib64plasma3 lib64solid4 lib64threadweaver4 Update: Tue Nov 01 13:32:43 2011 Importance: security ID: MDVSA-2011:162 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2011:162 %pre Multiple vulnerabilities was discovered and corrected in kdelibs4: KDE KSSL in kdelibs does not properly handle a \'\0\' (NUL) character in a domain name in the Subject Alternative Name field of an X.509 certificate, which allows man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408 (CVE-2009-2702). An input sanitization flaw was found in the KSSL (KDE SSL Wrapper) API. An attacker could supply a specially-crafted SSL certificate (for example, via a web page) to an application using KSSL, such as the Konqueror web browser, causing misleading information to be presented to the user, possibly tricking them into accepting the certificate as valid (CVE-2011-3365). The updated packages have been patched to correct these issues. %description Libraries for the K Desktop Environment. %package dumpcap lib64wireshark1 lib64wireshark-devel rawshark tshark wireshark wireshark-tools Update: Wed Nov 02 12:30:49 2011 Importance: security ID: MDVSA-2011:164 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2011:164 %pre This advisory updates wireshark to the latest version (1.6.3), fixing several security issues: An uninitialized variable in the CSN.1 dissector could cause a crash (CVE-2011-4100). Huzaifa Sidhpurwala of Red Hat Security Response Team discovered that the Infiniband dissector could dereference a NULL pointer (CVE-2011-4101). Huzaifa Sidhpurwala of Red Hat Security Response Team discovered a buffer overflow in the ERF file reader (CVE-2011-4102). The updated packages have been upgraded to the latest 1.6.x version (1.6.3) which is not vulnerable to these issues. %description Wireshark is a network traffic analyzer for Unix-ish operating systems. It is based on GTK+, a graphical user interface library, and libpcap, a packet capture and filtering library. Wireshark is a fork of Ethereal(tm) %package lib64php5_common5 php-bcmath php-bz2 php-calendar php-cgi php-cli php-ctype php-curl php-dba php-devel php-doc php-dom php-enchant php-exif php-fileinfo php-filter php-fpm php-ftp php-gd php-gettext php-gmp php-hash php-iconv php-imap php-intl php-json php-ldap php-mbstring php-mcrypt php-mssql php-mysql php-mysqli php-odbc php-openssl php-pcntl php-pdo php-pdo_dblib php-pdo_mysql php-pdo_odbc php-pdo_pgsql php-pdo_sqlite php-pgsql php-phar php-posix php-pspell php-readline php-recode php-session php-shmop php-snmp php-soap php-sockets php-sqlite3 php-sqlite php-sybase_ct php-sysvmsg php-sysvsem php-sysvshm php-tidy php-timezonedb php-tokenizer php-wddx php-xml php-xmlreader php-xmlrpc php-xmlwriter php-xsl php-zip php-zlib Update: Thu Nov 03 17:10:03 2011 Importance: security ID: MDVSA-2011:166 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2011:166 %pre A vulnerability has been identified and fixed in php: The is_a function in PHP 5.3.7 and 5.3.8 triggers a call to the __autoload function, which makes it easier for remote attackers to execute arbitrary code by providing a crafted URL and leveraging potentially unsafe behavior in certain PEAR packages and custom autoloaders (CVE-2011-3379). The php-ini-5.3.8 package was missing with the MDVSA-2011:165 advisory and is now being provided, the php-timezonedb package was upgraded to the latest version (2011.14) for 2011. The updated packages have been patched to correct this issue. %description PHP5 is an HTML-embeddable scripting language. PHP5 offers built-in database integration for several commercial and non-commercial database management systems, so writing a database-enabled script with PHP5 is fairly simple. The most common use of PHP5 coding is probably as a replacement for CGI scripts. This version of php has the suhosin patch 0.9.10 applied. Please report bugs here: http://qa.mandriva.com/ so that the official maintainer of this Mandriva package can help you. More information regarding the suhosin patch 0.9.10 here: http://www.suhosin.org/ %package lib64php5_common5 php-bcmath php-bz2 php-calendar php-cgi php-cli php-ctype php-curl php-dba php-devel php-doc php-dom php-enchant php-exif php-fileinfo php-filter php-fpm php-ftp php-gd php-gettext php-gmp php-hash php-iconv php-imap php-intl php-json php-ldap php-mbstring php-mcrypt php-mssql php-mysql php-mysqli php-odbc php-openssl php-pcntl php-pdo php-pdo_dblib php-pdo_mysql php-pdo_odbc php-pdo_pgsql php-pdo_sqlite php-pgsql php-phar php-posix php-pspell php-readline php-recode php-session php-shmop php-snmp php-soap php-sockets php-sqlite3 php-sqlite php-sybase_ct php-sysvmsg php-sysvsem php-sysvshm php-tidy php-timezonedb php-tokenizer php-wddx php-xml php-xmlreader php-xmlrpc php-xmlwriter php-xsl php-zip php-zlib Update: Thu Nov 03 17:12:21 2011 Importance: security ID: MDVSA-2011:166 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2011:166 %pre A vulnerability has been identified and fixed in php: The is_a function in PHP 5.3.7 and 5.3.8 triggers a call to the __autoload function, which makes it easier for remote attackers to execute arbitrary code by providing a crafted URL and leveraging potentially unsafe behavior in certain PEAR packages and custom autoloaders (CVE-2011-3379). The php-ini-5.3.8 package was missing with the MDVSA-2011:165 advisory and is now being provided, the php-timezonedb package was upgraded to the latest version (2011.14) for 2011. The updated packages have been patched to correct this issue. %description PHP5 is an HTML-embeddable scripting language. PHP5 offers built-in database integration for several commercial and non-commercial database management systems, so writing a database-enabled script with PHP5 is fairly simple. The most common use of PHP5 coding is probably as a replacement for CGI scripts. This version of php has the suhosin patch 0.9.10 applied. Please report bugs here: http://qa.mandriva.com/ so that the official maintainer of this Mandriva package can help you. More information regarding the suhosin patch 0.9.10 here: http://www.suhosin.org/ %package gimp gimp-python lib64gimp2.0_0 lib64gimp2.0-devel Update: Fri Nov 04 16:00:43 2011 Importance: security ID: MDVSA-2011:167 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2011:167 %pre A vulnerability has been discovered and corrected in gimp: The LZW decompressor in the LWZReadByte function in giftoppm.c in the David Koblas GIF decoder in PBMPLUS, as used in the gif_read_lzw function in filter/image-gif.c in CUPS before 1.4.7, the LZWReadByte function in plug-ins/common/file-gif-load.c in GIMP 2.6.11 and earlier, the LZWReadByte function in img/gifread.c in XPCE in SWI-Prolog 5.10.4 and earlier, and other products, does not properly handle code words that are absent from the decompression table when encountered, which allows remote attackers to trigger an infinite loop or a heap-based buffer overflow, and possibly execute arbitrary code, via a crafted compressed stream, a related issue to CVE-2006-1168 and CVE-2011-2895 (CVE-2011-2896). The updated packages have been patched to correct these issues. %description The GIMP is an image manipulation program suitable for photo retouching, image composition and image authoring. Many people find it extremely useful in creating logos and other graphics for web pages. The GIMP has many of the tools and filters you would expect to find in similar commercial offerings, and some interesting extras as well. The GIMP provides a large image manipulation toolbox, including channel operations and layers, effects, sub-pixel imaging and anti-aliasing, and conversions, all with multi-level undo. This version of The GIMP includes a scripting facility, but many of the included scripts rely on fonts that we cannot distribute. The GIMP ftp site has a package of fonts that you can install by yourself, which includes all the fonts needed to run the included scripts. Some of the fonts have unusual licensing requirements; all the licenses are documented in the package. Get them in ftp://ftp.gimp.org/pub/gimp/fonts/ if you are so inclined. Alternatively, choose fonts which exist on your system before running the scripts. Build Options: --without python Disable pygimp (default enabled) --with lzw Enable LZW compression in GIF (default disabled) %package php-apc php-apc-admin Update: Fri Nov 04 19:58:34 2011 Importance: bugfix ID: MDVA-2011:068 URL: http://www.mandriva.com/security/advisories?name=MDVA-2011:068 %pre A regression was found with php-apc-3.1.9 and with php-5.3.8. The updates packages has been patched to corrrect this issue. %description APC was conceived of to provide a way of boosting the performance of PHP on heavily loaded sites by providing a way for scripts to be cached in a compiled state, so that the overhead of parsing and compiling can be almost completely eliminated. There are commercial products which provide this functionality, but they are neither open-source nor free. Our goal was to level the playing field by providing an implementation that allows greater flexibility and is universally accessible. NOTE!: php-apc has to be loaded last, very important! This package comes with four different flavours of APC (use only one of them): o apc-mmap.so - mmap (fcntl) based locks (default) o apc-sem.so - IPC semamphore based locks o apc-spinlocks.so - Hardware-dependent implementation of spinlocks o apc-pthread.so - NPTL pthread mutex based locks %package rosa-launcher Update: Mon Nov 07 14:01:17 2011 Importance: bugfix ID: MDVA-2011:069 URL: http://www.mandriva.com/security/advisories?name=MDVA-2011:069 %pre This is a bugfix and maintenance update of the rosa-launcher package(s) that addresses the following issues: * Fixed bug with crash when launching from Welcome tab (#64674). * Fixed group labels disappearance when new Places shortcut added (#64675). * Added contraction of the names in the Recent Documents section (#64386,#64397). * Fixed shifting of the icons when tab changed to the Welcome (#64113). * Fixed adding empty shotcuts to the Recent Applications section (#64676). * Added Drag-and-Drop mechanism for items in the results of searching. * Ported ROSA Starter applet from Python to C++. %description ROSA Desktop Application Launcher %package apache-base apache-devel apache-htcacheclean apache-mod_authn_dbd apache-mod_cache apache-mod_dav apache-mod_dbd apache-mod_deflate apache-mod_disk_cache apache-mod_file_cache apache-mod_ldap apache-mod_mem_cache apache-mod_proxy apache-mod_proxy_ajp apache-mod_proxy_scgi apache-mod_reqtimeout apache-mod_ssl apache-modules apache-mod_userdir apache-mpm-event apache-mpm-itk apache-mpm-peruser apache-mpm-prefork apache-mpm-worker apache-source Update: Wed Nov 09 18:42:24 2011 Importance: bugfix ID: MDVA-2011:070 URL: http://www.mandriva.com/security/advisories?name=MDVA-2011:070 %pre The fix for CVE-2011-3192 provided by the MDVSA-2011:130 advisory introduced regressions in the way httpd handled certain Range HTTP header values. The updated packages have been patched to correct thus issue. %description This package contains the main binary of apache, a powerful, full-featured, efficient and freely-available Web server. Apache is also the most popular Web server on the Internet. This version of apache is fully modular, and many modules are available in pre-compiled formats, like PHP and mod_auth_external. This package defaults to a maximum of 128 dynamically loadable modules. This package defaults to a ServerLimit of 1024. You can change these values at RPM build time by using for example: --define 'maxmodules 512' --define 'serverlimit 2048' The package was built to support a maximum of 128 dynamically loadable modules. The package was built with a ServerLimit of 1024. %package firefox firefox-af firefox-ar firefox-ast firefox-be firefox-bg firefox-bn firefox-br firefox-bs firefox-ca firefox-cs firefox-cy firefox-da firefox-de firefox-devel firefox-el firefox-en_GB firefox-eo firefox-es_AR firefox-es_ES firefox-et firefox-eu firefox-fa firefox-fi firefox-fr firefox-fy firefox-ga_IE firefox-gd firefox-gl firefox-gu_IN firefox-he firefox-hi firefox-hr firefox-hu firefox-hy firefox-id firefox-is firefox-it firefox-ja firefox-kk firefox-kn firefox-ko firefox-ku firefox-lg firefox-lt firefox-lv firefox-mai firefox-mk firefox-ml firefox-mr firefox-nb_NO firefox-nl firefox-nn_NO firefox-nso firefox-or firefox-pa_IN firefox-pl firefox-pt_BR firefox-pt_PT firefox-ro firefox-ru firefox-si firefox-sk firefox-sl firefox-sq firefox-sr firefox-sv_SE firefox-ta firefox-te firefox-th firefox-tr firefox-uk firefox-vi firefox-zh_CN firefox-zh_TW firefox-zu lib64nss3 lib64nss-devel lib64nss-static-devel mozilla-thunderbird mozilla-thunderbird-enigmail mozilla-thunderbird-enigmail-ar mozilla-thunderbird-enigmail-ca mozilla-thunderbird-enigmail-cs mozilla-thunderbird-enigmail-de mozilla-thunderbird-enigmail-el mozilla-thunderbird-enigmail-es mozilla-thunderbird-enigmail-fi mozilla-thunderbird-enigmail-fr mozilla-thunderbird-enigmail-it mozilla-thunderbird-enigmail-ja mozilla-thunderbird-enigmail-ko mozilla-thunderbird-enigmail-nb mozilla-thunderbird-enigmail-nl mozilla-thunderbird-enigmail-pl mozilla-thunderbird-enigmail-pt mozilla-thunderbird-enigmail-pt_BR mozilla-thunderbird-enigmail-ru mozilla-thunderbird-enigmail-sl mozilla-thunderbird-enigmail-sv mozilla-thunderbird-enigmail-tr mozilla-thunderbird-enigmail-vi mozilla-thunderbird-enigmail-zh_CN mozilla-thunderbird-enigmail-zh_TW mozilla-thunderbird-lightning nsinstall nss rootcerts rootcerts-java Update: Wed Nov 09 19:25:39 2011 Importance: security ID: MDVSA-2011:169 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2011:169 %pre Security issues were identified and fixed in mozilla NSS, firefox and thunderbird: 22 weak 512-bit certificates issued by the DigiCert Sdn. Bhd certificate authority has been revoked from the root CA storage. This was fixed with rootcerts-20111103.00 and nss-3.13. DigiCert Sdn. Bhd is a Malaysian subordinate CA under Entrust and Verizon (GTE CyberTrust). It bears no affiliation whatsoever with the US-based corporation DigiCert, Inc., which is a member of Mozilla's root program. Untrusted search path vulnerability in Mozilla Network Security Services (NSS) might allow local users to gain privileges via a Trojan horse pkcs11.txt file in a top-level directory (CVE-2011-3640). Cross-site scripting (XSS) vulnerability in Mozilla Firefox before 3.6.24 and 4.x through 7.0 and Thunderbird before 3.1.6 and 5.0 through 7.0 allows remote attackers to inject arbitrary web script or HTML via crafted text with Shift JIS encoding (CVE-2011-3648). Mozilla Firefox before 3.6.24 and 4.x through 7.0 and Thunderbird before 3.1.6 and 5.0 through 7.0 do not properly handle JavaScript files that contain many functions, which allows user-assisted remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via a crafted file that is accessed by debugging APIs, as demonstrated by Firebug (CVE-2011-3650). The following vulnerabilities affetst Mandriva Linux 2011 only: Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 7.0 and Thunderbird 7.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors (CVE-2011-3651). The browser engine in Mozilla Firefox before 8.0 and Thunderbird before 8.0 does not properly allocate memory, which allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unspecified vectors (CVE-2011-3652). The browser engine in Mozilla Firefox before 8.0 and Thunderbird before 8.0 does not properly handle links from SVG mpath elements to non-SVG elements, which allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unspecified vectors (CVE-2011-3654). Mozilla Firefox 4.x through 7.0 and Thunderbird 5.0 through 7.0 perform access control without checking for use of the NoWaiverWrapper wrapper, which allows remote attackers to gain privileges via a crafted web site (CVE-2011-3655). The following vulnerabilities affects Mandriva Enterpriser Server 5.2 and Mandriva Linux 2010.2 only: The JSSubScriptLoader in Mozilla Firefox before 3.6.24 and Thunderbird before 3.1.6 does not properly handle XPCNativeWrappers during calls to the loadSubScript method in an add-on, which makes it easier for remote attackers to gain privileges via a crafted web site that leverages certain unwrapping behavior, a related issue to CVE-2011-3004 (CVE-2011-3647). Additionally, some packages which require so, have been rebuilt and are being provided as updates. %description This is a bundle of X.509 certificates of public Certificate Authorities (CA). These were automatically extracted from Mozilla's root CA list (the file "certdata.txt"). It contains the certificates in both plain text and PEM format and therefore can be directly used with an Apache/mod_ssl webserver for SSL client authentication. Just configure this file as the SSLCACertificateFile. %package firefox firefox-af firefox-ar firefox-ast firefox-be firefox-bg firefox-bn firefox-br firefox-bs firefox-ca firefox-cs firefox-cy firefox-da firefox-de firefox-devel firefox-el firefox-en_GB firefox-eo firefox-es_AR firefox-es_ES firefox-et firefox-eu firefox-fa firefox-fi firefox-fr firefox-fy firefox-ga_IE firefox-gd firefox-gl firefox-gu_IN firefox-he firefox-hi firefox-hr firefox-hu firefox-hy firefox-id firefox-is firefox-it firefox-ja firefox-kk firefox-kn firefox-ko firefox-ku firefox-lg firefox-lt firefox-lv firefox-mai firefox-mk firefox-ml firefox-mr firefox-nb_NO firefox-nl firefox-nn_NO firefox-nso firefox-or firefox-pa_IN firefox-pl firefox-pt_BR firefox-pt_PT firefox-ro firefox-ru firefox-si firefox-sk firefox-sl firefox-sq firefox-sr firefox-sv_SE firefox-ta firefox-te firefox-th firefox-tr firefox-uk firefox-vi firefox-zh_CN firefox-zh_TW firefox-zu lib64nss3 lib64nss-devel lib64nss-static-devel mozilla-thunderbird mozilla-thunderbird-ar mozilla-thunderbird-ca mozilla-thunderbird-cs mozilla-thunderbird-da mozilla-thunderbird-de mozilla-thunderbird-en_GB mozilla-thunderbird-enigmail mozilla-thunderbird-enigmail-ar mozilla-thunderbird-enigmail-ca mozilla-thunderbird-enigmail-cs mozilla-thunderbird-enigmail-de mozilla-thunderbird-enigmail-el mozilla-thunderbird-enigmail-es mozilla-thunderbird-enigmail-fi mozilla-thunderbird-enigmail-fr mozilla-thunderbird-enigmail-it mozilla-thunderbird-enigmail-ja mozilla-thunderbird-enigmail-ko mozilla-thunderbird-enigmail-nb mozilla-thunderbird-enigmail-nl mozilla-thunderbird-enigmail-pl mozilla-thunderbird-enigmail-pt mozilla-thunderbird-enigmail-pt_BR mozilla-thunderbird-enigmail-ru mozilla-thunderbird-enigmail-sl mozilla-thunderbird-enigmail-sv mozilla-thunderbird-enigmail-tr mozilla-thunderbird-enigmail-vi mozilla-thunderbird-enigmail-zh_CN mozilla-thunderbird-enigmail-zh_TW mozilla-thunderbird-es_AR mozilla-thunderbird-es_ES mozilla-thunderbird-et mozilla-thunderbird-eu mozilla-thunderbird-fi mozilla-thunderbird-fr mozilla-thunderbird-fy mozilla-thunderbird-ga mozilla-thunderbird-gd mozilla-thunderbird-gl mozilla-thunderbird-he mozilla-thunderbird-hu mozilla-thunderbird-is mozilla-thunderbird-it mozilla-thunderbird-ja mozilla-thunderbird-ko mozilla-thunderbird-lightning mozilla-thunderbird-lt mozilla-thunderbird-nb_NO mozilla-thunderbird-nl mozilla-thunderbird-nn_NO mozilla-thunderbird-pl mozilla-thunderbird-pt_BR mozilla-thunderbird-pt_PT mozilla-thunderbird-ru mozilla-thunderbird-si mozilla-thunderbird-sk mozilla-thunderbird-sl mozilla-thunderbird-sq mozilla-thunderbird-sv_SE mozilla-thunderbird-tr mozilla-thunderbird-uk mozilla-thunderbird-zh_TW nsinstall nss rootcerts rootcerts-java Update: Wed Nov 09 19:44:37 2011 Importance: security ID: MDVSA-2011:169 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2011:169 %pre Security issues were identified and fixed in mozilla NSS, firefox and thunderbird: 22 weak 512-bit certificates issued by the DigiCert Sdn. Bhd certificate authority has been revoked from the root CA storage. This was fixed with rootcerts-20111103.00 and nss-3.13. DigiCert Sdn. Bhd is a Malaysian subordinate CA under Entrust and Verizon (GTE CyberTrust). It bears no affiliation whatsoever with the US-based corporation DigiCert, Inc., which is a member of Mozilla's root program. Untrusted search path vulnerability in Mozilla Network Security Services (NSS) might allow local users to gain privileges via a Trojan horse pkcs11.txt file in a top-level directory (CVE-2011-3640). Cross-site scripting (XSS) vulnerability in Mozilla Firefox before 3.6.24 and 4.x through 7.0 and Thunderbird before 3.1.6 and 5.0 through 7.0 allows remote attackers to inject arbitrary web script or HTML via crafted text with Shift JIS encoding (CVE-2011-3648). Mozilla Firefox before 3.6.24 and 4.x through 7.0 and Thunderbird before 3.1.6 and 5.0 through 7.0 do not properly handle JavaScript files that contain many functions, which allows user-assisted remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via a crafted file that is accessed by debugging APIs, as demonstrated by Firebug (CVE-2011-3650). The following vulnerabilities affetst Mandriva Linux 2011 only: Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 7.0 and Thunderbird 7.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors (CVE-2011-3651). The browser engine in Mozilla Firefox before 8.0 and Thunderbird before 8.0 does not properly allocate memory, which allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unspecified vectors (CVE-2011-3652). The browser engine in Mozilla Firefox before 8.0 and Thunderbird before 8.0 does not properly handle links from SVG mpath elements to non-SVG elements, which allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unspecified vectors (CVE-2011-3654). Mozilla Firefox 4.x through 7.0 and Thunderbird 5.0 through 7.0 perform access control without checking for use of the NoWaiverWrapper wrapper, which allows remote attackers to gain privileges via a crafted web site (CVE-2011-3655). The following vulnerabilities affects Mandriva Enterpriser Server 5.2 and Mandriva Linux 2010.2 only: The JSSubScriptLoader in Mozilla Firefox before 3.6.24 and Thunderbird before 3.1.6 does not properly handle XPCNativeWrappers during calls to the loadSubScript method in an add-on, which makes it easier for remote attackers to gain privileges via a crafted web site that leverages certain unwrapping behavior, a related issue to CVE-2011-3004 (CVE-2011-3647). Additionally, some packages which require so, have been rebuilt and are being provided as updates. %description This is a bundle of X.509 certificates of public Certificate Authorities (CA). These were automatically extracted from Mozilla's root CA list (the file "certdata.txt"). It contains the certificates in both plain text and PEM format and therefore can be directly used with an Apache/mod_ssl webserver for SSL client authentication. Just configure this file as the SSLCACertificateFile. %package dkms dkms-minimal Update: Thu Nov 10 11:29:07 2011 Importance: bugfix ID: MDVA-2011:071 URL: http://www.mandriva.com/security/advisories?name=MDVA-2011:071 %pre The RPM spec file template used by dkms to generate binary kernel dkms packages was broken. The updated packages solves this problem. %description This package contains the framework for the Dynamic Kernel Module Support (DKMS) method for installing module RPMS as originally developed by the Dell Computer Corporation. This package is intended for building binary kernel modules with dkms source packages installed %package timezone timezone-java Update: Thu Nov 10 14:13:32 2011 Importance: bugfix ID: MDVA-2011:072 URL: http://www.mandriva.com/security/advisories?name=MDVA-2011:072 %pre Timezone is a package that contains data files with rules for various timezones around the world. This update addresses the following changes: - Fiji adopts DST for 2011 (effective Oct 23rd, 2011) - West Bank changes date for DST end in 2011 to Sep 30th - Fix DST for: Pridnestrovian Moldavian Republic, Ukraine, Bahia and Brazil. %description This package contains data files with rules for various timezones around the world. %package icedtea-web java-1.6.0-openjdk java-1.6.0-openjdk-demo java-1.6.0-openjdk-devel java-1.6.0-openjdk-javadoc java-1.6.0-openjdk-src Update: Fri Nov 11 14:40:01 2011 Importance: security ID: MDVSA-2011:170 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2011:170 %pre Security issues were identified and fixed in openjdk (icedtea6) and icedtea-web: IcedTea6 prior to 1.10.4 allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality via unknown vectors related to Networking (CVE-2011-3547). IcedTea6 prior to 1.10.4 allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability, related to AWT (CVE-2011-3548). IcedTea6 prior to 1.10.4 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to 2D (CVE-2011-3551). IcedTea6 prior to 1.10.4 allows remote attackers to affect integrity via unknown vectors related to Networking (CVE-2011-3552). IcedTea6 prior to 1.10.4 allows remote authenticated users to affect confidentiality, related to JAXWS (CVE-2011-3553). IcedTea6 prior to 1.10.4 allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Scripting (CVE-2011-3544). IcedTea6 prior to 1.10.4 allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors related to Deserialization (CVE-2011-3521). IcedTea6 prior to 1.10.4 allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality, integrity, and availability via unknown vectors (CVE-2011-3554). A flaw was found in the way the SSL 3 and TLS 1.0 protocols used block ciphers in cipher-block chaining (CBC) mode. An attacker able to perform a chosen plain text attack against a connection mixing trusted and untrusted data could use this flaw to recover portions of the trusted data sent over the connection (CVE-2011-3389). Note: This update mitigates the CVE-2011-3389 issue by splitting the first application data record byte to a separate SSL/TLS protocol record. This mitigation may cause compatibility issues with some SSL/TLS implementations and can be disabled using the jsse.enableCBCProtection boolean property. This can be done on the command line by appending the flag -Djsse.enableCBCProtection=false to the java command. IcedTea6 prior to 1.10.4 allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality via unknown vectors related to HotSpot (CVE-2011-3558). IcedTea6 prior to 1.10.4 allows remote attackers to affect confidentiality, integrity, and availability, related to RMI (CVE-2011-3556). IcedTea6 prior to 1.10.4 allows remote attackers to affect confidentiality, integrity, and availability, related to RMI (CVE-2011-3557). IcedTea6 prior to 1.10.4 allows remote untrusted Java Web Start applications and untrusted Java applets to affect confidentiality and integrity, related to JSSE (CVE-2011-3560). Deepak Bhole discovered a flaw in the Same Origin Policy (SOP) implementation in the IcedTea project Web browser plugin. A malicious applet could use this flaw to bypass SOP protection and open connections to any sub-domain of the second-level domain of the applet's origin, as well as any sub-domain of the domain that is the suffix of the origin second-level domain. For example, IcedTea-Web plugin allowed applet from some.host.example.com to connect to other.host.example.com, www.example.com, and example.com, as well as www.ample.com or ample.com. (CVE-2011-3377). %description The OpenJDK runtime environment. %package smplayer Update: Fri Nov 11 16:37:44 2011 Importance: bugfix ID: MDVA-2011:073 URL: http://www.mandriva.com/security/advisories?name=MDVA-2011:073 %pre MIME types are listed wrong in smplayer.desktop file in Mandriva 2011. It causes, among other things, impossibility to open flv files in smplayer using Dolphin context menu. %description SMPlayer intends to be a complete front-end for MPlayer, from basic features like playing videos, DVDs, and VCDs to more advanced features like support for MPlayer filters and more. One of the most interesting features of SMPlayer: it remembers the settings of all files you play. So you start to watch a movie but you have to leave... don't worry, when you open that movie again it will resume at the same point you left it, and with the same settings: audio track, subtitles, volume... Other additional interesting features: * New GUI. Now there are toolbars, the control at the bottom is different (and it changes if the window is made smaller), the icons can be changed (several icon themes are available). In fullscreen mode the floating control that appears when you move the mouse to the bottom of the screen is new too and this time the video doesn't resize when it shows. * Configurable key shortcuts. A shortcut editor has been added, it's located at "Preferences->Mouse & keyboard". Please read Configurable_shortcuts.txt. * Support for VCD. Now you can also play VCD discs. * System tray icon. Now it's possible to leave SMPlayer running in the system tray. This feature requires Qt 4.2. * Added some new functions, like pan&scan, stay on top, set the size of the window... * Improved support for subtitles. For instance, now you can load a idx/sub file and you'll be able to select among all languages that the file provides. You can have a mkv file with embedded subtitles, load an idx/sub file (or srt, sub...) and all subtitles will be available. * New translations. SMPlayer 0.5.0 is translated (totally or partially) to the following languages: Bulgarian, Czech, German, Spanish, French, Hungarian, Italian, Japanese, Georgian, Dutch, Polish, Brazilian Portuguese, Russian, Slovak, Serbian, Swedish, Turkish, Ukrainian, Simplified-Chinese and Traditional Chinese. By the way, now it's possible to change the language at run-time. SMPlayer supports themes which can be found in smplayer-themes package. %package lib64nm-glib2 lib64nm-glib-devel lib64nm-glib-vpn1 lib64nm-glib-vpn-devel lib64nm-util1 lib64nm-util-devel networkmanager networkmanager-applet networkmanager-openconnect networkmanager-openvpn networkmanager-pptp networkmanager-vpnc Update: Fri Nov 11 21:11:25 2011 Importance: security ID: MDVSA-2011:171 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2011:171 %pre Security issues were identified and fixed in networkmanager: GNOME NetworkManager before 0.8.6 does not properly enforce the auth_admin element in PolicyKit, which allows local users to bypass intended wireless network sharing restrictions via unspecified vectors (CVE-2011-2176). Incomplete blacklist vulnerability in the svEscape function in settings/plugins/ifcfg-rh/shvar.c in the ifcfg-rh plug-in for GNOME NetworkManager 0.9.1, 0.9.0, 0.8.1, and possibly other versions, when PolicyKit is configured to allow users to create new connections, allows local users to execute arbitrary commands via a newline character in the name for a new network connection, which is not properly handled when writing to the ifcfg file (CVE-2011-3364). Instead of patching networkmanager, the latest 0.8.6.0 stable version is being provided due to the large amount of bugs fixed upstream. Also the networkmanager-applet, networkmanager-openconnect, networkmanager-openvpn, networkmanager-pptp, networkmanager-vpnc is being provided with their latest 0.8.6.0 stable versions. The provided packages solves these security vulnerabilities. %description This package contains software for integrating the vpnc VPN software with NetworkManager and the GNOME desktop %package gaupol lib64graphite2_2 lib64graphite2-devel libreoffice libreoffice-base libreoffice-calc libreoffice-common libreoffice-core libreoffice-devel libreoffice-devel-doc libreoffice-draw libreoffice-filter-binfilter libreoffice-gnome libreoffice-help-bg libreoffice-help-bn libreoffice-help-bs libreoffice-help-ca libreoffice-help-cs libreoffice-help-da libreoffice-help-de libreoffice-help-dz libreoffice-help-el libreoffice-help-en_GB libreoffice-help-en_US libreoffice-help-es libreoffice-help-et libreoffice-help-eu libreoffice-help-fi libreoffice-help-fr libreoffice-help-gl libreoffice-help-gu libreoffice-help-he libreoffice-help-hi libreoffice-help-hr libreoffice-help-hu libreoffice-help-it libreoffice-help-ja libreoffice-help-ko libreoffice-help-mk libreoffice-help-nb libreoffice-help-nl libreoffice-help-nn libreoffice-help-pl libreoffice-help-pt libreoffice-help-pt_BR libreoffice-help-ru libreoffice-help-si libreoffice-help-sk libreoffice-help-sl libreoffice-help-sv libreoffice-help-tr libreoffice-help-uk libreoffice-help-zh_CN libreoffice-help-zh_TW libreoffice-impress libreoffice-java-common libreoffice-kde4 libreoffice-l10n-af libreoffice-l10n-ar libreoffice-l10n-as libreoffice-l10n-bg libreoffice-l10n-bn libreoffice-l10n-br libreoffice-l10n-bs libreoffice-l10n-ca libreoffice-l10n-cs libreoffice-l10n-cy libreoffice-l10n-da libreoffice-l10n-de libreoffice-l10n-dz libreoffice-l10n-el libreoffice-l10n-en_GB libreoffice-l10n-es libreoffice-l10n-et libreoffice-l10n-eu libreoffice-l10n-fa libreoffice-l10n-fi libreoffice-l10n-fr libreoffice-l10n-ga libreoffice-l10n-gl libreoffice-l10n-gu libreoffice-l10n-he libreoffice-l10n-hi libreoffice-l10n-hr libreoffice-l10n-hu libreoffice-l10n-it libreoffice-l10n-ja libreoffice-l10n-kn libreoffice-l10n-ko libreoffice-l10n-lt libreoffice-l10n-lv libreoffice-l10n-mai libreoffice-l10n-mk libreoffice-l10n-ml libreoffice-l10n-mr libreoffice-l10n-nb libreoffice-l10n-nl libreoffice-l10n-nn libreoffice-l10n-nr libreoffice-l10n-nso libreoffice-l10n-or libreoffice-l10n-pa_IN libreoffice-l10n-pl libreoffice-l10n-pt libreoffice-l10n-pt_BR libreoffice-l10n-ro libreoffice-l10n-ru libreoffice-l10n-sh libreoffice-l10n-si libreoffice-l10n-sk libreoffice-l10n-sl libreoffice-l10n-sr libreoffice-l10n-ss libreoffice-l10n-st libreoffice-l10n-sv libreoffice-l10n-ta libreoffice-l10n-te libreoffice-l10n-th libreoffice-l10n-tn libreoffice-l10n-tr libreoffice-l10n-ts libreoffice-l10n-uk libreoffice-l10n-ve libreoffice-l10n-xh libreoffice-l10n-zh_CN libreoffice-l10n-zh_TW libreoffice-l10n-zu libreoffice-math libreoffice-openclipart libreoffice-pdfimport libreoffice-presentation-minimizer libreoffice-presenter-screen libreoffice-pyuno libreoffice-style-crystal libreoffice-style-galaxy libreoffice-style-hicontrast libreoffice-style-oxygen libreoffice-style-tango libreoffice-testtool libreoffice-wiki-publisher libreoffice-writer python-aeidon Update: Fri Nov 11 22:15:26 2011 Importance: security ID: MDVSA-2011:172 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2011:172 %pre Multiple vulnerabilies has been discovered and corrected in libreoffice: Stack-based buffer overflow in the Lotus Word Pro import filter in LibreOffice before 3.3.3 allows remote attackers to execute arbitrary code via a crafted .lwp file (CVE-2011-2685). oowriter in OpenOffice.org 3.3.0 and LibreOffice before 3.4.3 allows user-assisted remote attackers to cause a denial of service (crash) via a crafted DOC file that triggers an out-of-bounds read in the DOC sprm parser (CVE-2011-2713). This update brings a new LibreOffice version 3.4.3 release linked against stdc++ and gcc_s standard libraries available in the Mandriva 2011 and solves installing conflicts with libstdc++ (#64224). The package clipart-openclipart was dropped from the main repository in the Mandriva 2011. However it is not required having clipart-openclipart installed in order to install libreoffice-openclipart as the LibreOffice still provides some cliparts directly in that package (#63634). This update fixes some OpenOffice.org leftovers in some packages description replacing that by LibreOffice (#64658). This update brings new LibreOffice l10n locale packages: Assanese as, Bengali bn, Dzongkha dz, Farsi fa, Irish ga, Galician gl, Gujarati gu, Croatian hr, Kannada kn, Lithuanian lt, Latvian lv, Maithili mai, Malayalam ml, Marathi mr, Ndebele nr, Northern Shoto nso, Oriya or, Punjabi pa_IN, Romanian ro, Secwepemctsin sh, Sinhalese si, Serbian sr, Swati ss, Shoto st, Telugu te, Thai th, Tswana tn, Tsonga ts, Ukrainian uk, Venda ve and Xhosa xh. Help packages are also provided for: bn, dz, gl, gu, hr, si and uk. Additionally the gaupol packages are being provided to solve a build dependcy of some of the supporting tools already added into 2011. The updated packages have been upgraded to LibreOffice version 3.4.3 where these isssues has been resolved. %description Editor for text-based subtitle files. It supports multiple subtitle file formats and provides means of correcting texts and timing subtitles to match video. The user interface is designed with attention to batch processing of multiple documents and convenience of translating. %package lib64tesseract3 tesseract tesseract-bul tesseract-cat tesseract-ces tesseract-chi_sim tesseract-chi_tra tesseract-chr tesseract-dan tesseract-dan-frak tesseract-deu tesseract-deu-frak tesseract-devel tesseract-ell tesseract-eng tesseract-fin tesseract-fra tesseract-hun tesseract-ind tesseract-ita tesseract-jpn tesseract-kor tesseract-lav tesseract-lit tesseract-nld tesseract-nor tesseract-pol tesseract-por tesseract-ron tesseract-rus tesseract-slk tesseract-slv tesseract-spa tesseract-srp tesseract-swe tesseract-swe-frak tesseract-tgl tesseract-tur tesseract-ukr tesseract-vie Update: Sat Nov 12 10:27:04 2011 Importance: bugfix ID: MDVA-2011:074 URL: http://www.mandriva.com/security/advisories?name=MDVA-2011:074 %pre In Mandriva 2011 tesseract package is of 3.00 version, but its language data packages are obsolete, in 2.x format. Without proper data files (*.traineddata) tesseract is unable to recognize any text. %description The Tesseract OCR engine was one of the top 3 engines in the 1995 UNLV Accuracy test. Since then it has had little work done on it, but it is probably one of the most accurate open source OCR engines available. The source code will read a binary, grey or color image and output text. A tiff reader is built in that will read uncompressed TIFF images, or libtiff can be added to read compressed images. %package sound-scripts Update: Sat Nov 12 10:43:22 2011 Importance: bugfix ID: MDVA-2011:075 URL: http://www.mandriva.com/security/advisories?name=MDVA-2011:075 %pre Alsa volume settings are not restored after reboot, even if you use alsasctl-store to save the current status, reason: rc script checks for existence of alsa state file (asound.state) which is now located in /var/lib/alsa/, not in /etc/ anymore. %description The sound-scripts package contains the basic system scripts used: - to setup default sound mixer on first boot - save sound mixer level on shutdown - restore sound mixer on bootstrapping %package bomber bovo granatier kajongg kapman katomic kbattleship kblackbox kblocks kbounce kbreakout kdegames4 kdegames4-core kdegames4-devel kdesnake kdiamond kfourinline kgoldrunner kigo killbots kiriki kjumpingcube klickety klines kmahjongg kmahjongglib kmines knetwalk kolf kollision konquest kpat kreversi kshisen ksirk kspaceduel ksquares ksudoku ktron ktuberling kubrick lib64iris_ksirk2 lib64kdegames5 lib64kggzgames4 lib64kggzmod4 lib64kggznet4 lib64kmahjongglib4 lib64kolfprivate4 lib64pala0 lskat palapeli Update: Sat Nov 12 11:20:39 2011 Importance: bugfix ID: MDVA-2011:076 URL: http://www.mandriva.com/security/advisories?name=MDVA-2011:076 %pre On Mandriva 2011 kdesnake is not starting because a missing dependency which is added on this updated package, fixing the not starting issue. %description Games for the K Desktop Environment. This is a compilation of various games for KDE project - katomic: build complex atoms with a minimal amount of moves - kbattleship: battleship game with built-in game server - kblackbox: find atoms in a grid by shooting electrons - kbounce: claim areas and don't get disturbed - klines: place 5 equal pieces together, but wait, there are 3 new ones - mahjongg: a tile laying patience - kmines: the classical mine sweeper - kolf: a golf game - konquest: conquer the planets of your enemy - kpat: several patience card games - kreversi: the old reversi board game, also known as othello - kshisen: patience game where you take away all pieces - kspaceduel: two player game with shooting spaceships flying around a sun - ktuberling: kids game: make your own potato (NO french fries!) - kfourinline: place 4 pieces in a row - Lskat: lieutnant skat - Ksudoku: Play, create and solve sudoku grids - KGoldrunner: a game of action and puzzle solving. - KTuberling: "potato editor" game - Kiriki: Close of Yahtzee - Kjumpingcube: a tactical game for number-crunchers - Bovo: classic pen and paper game - KSquares: an implementation of the popular paper based game squares - Knetwalk: Turn the board pieces to get all computers connected %package lib64graphite2_2 lib64graphite2-devel Update: Mon Nov 14 15:34:58 2011 Importance: security ID: MDVSA-2011:174 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2011:174 %pre Unspecified vulnerabilities were discovered in graphite2 conserning specially crafted TTF fonts and which has unknown impact. As a preemptive measure the new 1.0.3 version is being provided where this is fixed. %description Graphite2 is a project within SIL's Non-Roman Script Initiative and Language Software Development groups to provide rendering capabilities for complex non-Roman writing systems. Graphite can be used to create "smart fonts" capable of displaying writing systems with various complex behaviors. With respect to the Text Encoding Model, Graphite handles the "Rendering" aspect of writing system implementation. %package lib64graphite2_2 lib64graphite2-devel Update: Mon Nov 14 15:35:59 2011 Importance: security ID: MDVSA-2011:174 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2011:174 %pre Unspecified vulnerabilities were discovered in graphite2 conserning specially crafted TTF fonts and which has unknown impact. As a preemptive measure the new 1.0.3 version is being provided where this is fixed. %description Graphite2 is a project within SIL's Non-Roman Script Initiative and Language Software Development groups to provide rendering capabilities for complex non-Roman writing systems. Graphite can be used to create "smart fonts" capable of displaying writing systems with various complex behaviors. With respect to the Text Encoding Model, Graphite handles the "Rendering" aspect of writing system implementation. %package mandriva-theme-common mandriva-theme-extra mandriva-theme-Flash mandriva-theme-Flash-screensaver mandriva-theme-Free mandriva-theme-Free-screensaver mandriva-theme-One mandriva-theme-One-screensaver mandriva-theme-Powerpack mandriva-theme-Powerpack-screensaver mandriva-theme-Rosa mandriva-theme-Rosa-screensaver Update: Mon Nov 14 17:11:54 2011 Importance: bugfix ID: MDVA-2011:077 URL: http://www.mandriva.com/security/advisories?name=MDVA-2011:077 %pre This update brings the Mandriva-PowerPack theme with new backgrounds and plymouth images for the upcoming Mandriva Linux 2011 PowerPack. %description This package contains the Mandriva plymouth theme with its images and configuration for different resolution as well as the the desktop background image. %package msec msec-gui Update: Mon Nov 14 17:39:05 2011 Importance: bugfix ID: MDVA-2011:078 URL: http://www.mandriva.com/security/advisories?name=MDVA-2011:078 %pre This update enables the networkmanager service during install. Additionally this fixes the check of /var/lib/svn (#63875). %description The Mandriva Linux Security package is designed to provide security features to the Mandriva Linux users. It allows to select from a set of preconfigured security levels, and supports custom permission settings, user-specified levels, and several security utilities. This packages includes main msec application and several programs that will be run periodically in order to test the security of your system and alert you if needed. %package setup Update: Mon Nov 14 17:41:16 2011 Importance: bugfix ID: MDVA-2011:079 URL: http://www.mandriva.com/security/advisories?name=MDVA-2011:079 %pre This update pre-populate /etc/passwd and /etc/group with messagebus user/group to avoid freeze issue at boot (#63043, #63500) during a network/DVD install. %description The setup package contains a set of very important system configuration and setup files, such as passwd, group, profile and more. You should install the setup package because you will find yourself using its many features for system administration. %package shorewall shorewall6 shorewall6-lite shorewall-doc shorewall-init shorewall-lite Update: Mon Nov 14 17:42:43 2011 Importance: bugfix ID: MDVA-2011:080 URL: http://www.mandriva.com/security/advisories?name=MDVA-2011:080 %pre This update upgrades shorewall to the 4.4.25 version which has better systemd integration. %description The Shoreline Firewall, more commonly known as "Shorewall", is a Netfilter (iptables) based firewall that can be used on a dedicated firewall system, a multi-function gateway/ router/server or on a standalone GNU/Linux system. %package lib64msn0.3 libmsn-devel libmsn-test Update: Mon Nov 14 18:12:52 2011 Importance: bugfix ID: MDVA-2011:081 URL: http://www.mandriva.com/security/advisories?name=MDVA-2011:081 %pre An error has been found in libmsn library used by Kopete Instant Messaging Application, in the way SOAP redirects where handled which was preventing Windows Live Messenger users from logging into their accounts. The updated package have been patched to correct this issue. %description Libmsn is a reusable, open-source, fully documented library for connecting to Microsoft's MSN Messenger service. %package lib64sqlite3_0 lib64sqlite3-devel lib64sqlite3-static-devel sqlite3-tools Update: Mon Nov 14 18:22:28 2011 Importance: bugfix ID: MDVA-2011:082 URL: http://www.mandriva.com/security/advisories?name=MDVA-2011:082 %pre SQLite 3.7.7 contains a bug which makes subversion(svn) unusable because you are not able to commit your changes. This update fixes this issue. %description SQLite is a C library that implements an embeddable SQL database engine. Programs that link with the SQLite library can have SQL database access without running a separate RDBMS process. The distribution comes with a standalone command-line access program (sqlite) that can be used to administer an SQLite database and which serves as an example of how to use the SQLite library. %package bind bind-devel bind-doc bind-utils Update: Wed Nov 16 22:21:52 2011 Importance: security ID: MDVSA-2011:176 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2011:176 %pre A vulnerability was discovered and corrected in bind: Cache lookup could return RRSIG data associated with nonexistent records, leading to an assertion failure. [ISC RT #26590] (CVE-2011-4313). The updated packages have been upgraded to bind 9.7.4-P1 and 9.8.1-P1 which is not vulnerable to this issue. %description BIND (Berkeley Internet Name Domain) is an implementation of the DNS (domain Name System) protocols. BIND includes a DNS server (named), which resolves host names to IP addresses, and a resolver library (routines for applications to use when interfacing with DNS). A DNS server allows clients to name resources or objects and share the information with other network machines. The named DNS server can be used on workstations as a caching name server, but is generally only needed on one machine for an entire network. Note that the configuration files for making BIND act as a simple caching nameserver are included in the caching-nameserver package. Install the bind package if you need a DNS server for your network. If you want bind to act a caching name server, you will also need to install the caching-nameserver package. Many BIND 8 features previously unimplemented in BIND 9, including domain-specific forwarding, the \$GENERATE master file directive, and the "blackhole", "dialup", and "sortlist" options Forwarding of dynamic update requests; this is enabled by the "allow-update-forwarding" option A new, simplified database interface and a number of sample drivers based on it; see doc/dev/sdb for details Support for building single-threaded servers for environments that do not supply POSIX threads New configuration options: "min-refresh-time", "max-refresh-time", "min-retry-time", "max-retry-time", "additional-from-auth", "additional-from-cache", "notify explicit" Faster lookups, particularly in large zones. Build Options: --without sdb_ldap Build without ldap simple database support (enabled per default) --with sdb_mysql Build with MySQL database support (disables ldap support, it's either way.) %package freetype2-demos lib64freetype6 lib64freetype6-devel lib64freetype6-static-devel Update: Mon Nov 21 15:38:01 2011 Importance: security ID: MDVSA-2011:177 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2011:177 %pre A vulnerability has been discovered and corrected in freetype2: FreeType allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted font in a document (CVE-2011-3439). The updated packages have been patched to correct these issues. %description The FreeType2 engine is a free and portable TrueType font rendering engine. It has been developed to provide TT support to a great variety of platforms and environments. Note that FreeType2 is a library, not a stand-alone application, though some utility applications are included %package plasma-applet-stackfolder Update: Thu Nov 24 14:44:59 2011 Importance: bugfix ID: MDVA-2011:084 URL: http://www.mandriva.com/security/advisories?name=MDVA-2011:084 %pre StackFolder outputs some debug and warning messages to the xsession-errors file. This update fixes it by avoiding the output of this harmless messages. %description Browse the stack of folders %package kdebase4-runtime kdebase4-runtime-devel kwallet-daemon lib64kwalletbackend4 lib64molletnetwork4 lib64nepomuksync4 phonon-xine-kcm Update: Thu Nov 24 15:54:53 2011 Importance: bugfix ID: MDVA-2011:085 URL: http://www.mandriva.com/security/advisories?name=MDVA-2011:085 %pre This update adds a require on virtuoso to make sure nepomuk works out of the box. %description KDE 4 application runtime components. %package glibc glibc-devel glibc-doc glibc-doc-pdf glibc-i18ndata glibc-profile glibc-static-devel glibc-utils nscd Update: Fri Nov 25 19:48:15 2011 Importance: security ID: MDVSA-2011:179 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2011:179 %pre Multiple vulnerabilities was discovered and fixed in glibc: The addmntent function in the GNU C Library (aka glibc or libc6) 2.13 and earlier does not report an error status for failed attempts to write to the /etc/mtab file, which makes it easier for local users to trigger corruption of this file, as demonstrated by writes from a process with a small RLIMIT_FSIZE value, a different vulnerability than CVE-2010-0296 (CVE-2011-1089). Integer overflow in posix/fnmatch.c in the GNU C Library (aka glibc or libc6) 2.13 and earlier allows context-dependent attackers to cause a denial of service (application crash) via a long UTF8 string that is used in an fnmatch call with a crafted pattern argument, a different vulnerability than CVE-2011-1071 (CVE-2011-1659). crypt_blowfish before 1.1, as used in glibc on certain platforms, does not properly handle 8-bit characters, which makes it easier for context-dependent attackers to determine a cleartext password by leveraging knowledge of a password hash (CVE-2011-2483). The updated packages have been patched to correct these issues. %description The glibc package contains standard libraries which are used by multiple programs on the system. In order to save disk space and memory, as well as to make upgrading easier, common system code is kept in one place and shared between programs. This particular package contains the most important sets of shared libraries: the standard C library and the standard math library. Without these two libraries, a Linux system will not function. The glibc package also contains national language (locale) support. This package now also provides ldconfig which was package seperately in the past. Ldconfig is a basic system program which determines run-time link bindings between ld.so and shared libraries. Ldconfig scans a running system and sets up the symbolic links that are used to load shared libraries properly. It also creates a cache (/etc/ld.so.cache) which speeds the loading of programs which use shared libraries. %package sphere-client-rosa Update: Sat Nov 26 13:18:19 2011 Importance: bugfix ID: MDVA-2011:086 URL: http://www.mandriva.com/security/advisories?name=MDVA-2011:086 %pre This is a bugfix and maintenance update of the sphere-client-rosa package(s) that addresses the following issues: - Added sphere-client.desktop file and icon-file in the package for SimpleWelcome application [enhancement] - fixed bug - user can send empty follow for ticket (#64842) - fixed bug for display text of long ticket's body (#64843) - added notifications through D-Bus, removed old notification-system [enhancement] %description sphere-client-rosa %package php-suhosin Update: Mon Nov 28 14:29:35 2011 Importance: security ID: MDVSA-2011:180 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2011:180 %pre A vulnerability was discovered and fixed in php-suhosin: crypt_blowfish before 1.1, as used in suhosin does not properly handle 8-bit characters, which makes it easier for context-dependent attackers to determine a cleartext password by leveraging knowledge of a password hash (CVE-2011-2483). The updated packages have been patched to correct this issue. %description Suhosin is an advanced protection system for PHP installations. It was designed to protect servers and users from known and unknown flaws in PHP applications and the PHP core. Suhosin is binary compatible to normal PHP installation, which means it is compatible to 3rd party binary extension like ZendOptimizer. %package drakx-finish-install drakx-installer-advertising drakx-installer-binaries drakx-installer-binaries-probe drakx-installer-rescue drakx-installer-stage2 drakxtools drakxtools-backend drakxtools-curses drakxtools-http harddrake harddrake-ui Update: Mon Dec 05 11:50:13 2011 Importance: bugfix ID: MDVA-2011:087 URL: http://www.mandriva.com/security/advisories?name=MDVA-2011:087 %pre This is a bugfix and maintenance update of drakxtools, drakx-installer-stage2, drakx-installer-rescue, drakx-installer-binaries and drakx-installer-advertising-2010.1 that addresses the following issues: drakxtools: - fix /media/cdrom creation, enable nepomuk - add PWP text - configure network before bootloader installation - use $::prefix to get it working in install process - fix systemctl in installer - remove update steps - all services has not been migrated to systemd, so restore chkconfig in this case - use systemctl instead of chkconfig - enable networkmanager.service, fix kernel-firmware installation, remove /etc/hostname pre-configuration - no more server flavour for 32bits machines. - fix network test with missing perl lib Net/Ping.pm - revert to desktop586 (du to latest package), and install kernel server if ram is around 8Gb - be sure that kernel-firmware has been installed (since latest package requires changement...) - dont hide the networking step - Disable desktop choice, force KDE choice, even if Gnome is available - fix condition for modules compression test. - add rpm-helper and shadow-utils because requires(pre) doesnt seems to work - use PWP theme - increase right windows size - was not a good idea to use /sbin/modprobe in install mode... reverting, and doing uncompress using gzip only if modules ares gziped - fix typo in if condition - detect IDE only if /proc/ide exists (fix for kernel => 2.6.39), and move detection to the end - simplify mdv theme drakx-installer-rescue: - fix fakeroot usage for device nodes creation in rescue.sqfs - Since we switched to systemd and we don't want to include its whole deps, we choose the fast path and remove the use of init entirely since it's not really used. - modules names has changed (scsi_mod, sd_mod) - remove restore tools drakx-installer-advertising-2010.1: - update advertising (2011) drakx-installer-stage2: - fix network test with missing perl lib Net/Ping.pm - install kernel server if ram is around 8Gb - be sure that kernel-firmware has been installed (since latest package requires changement...) - dont hide the networking step - Disable desktop choice, force KDE choice, even if Gnome is available - fix condition for modules compression test - add rpm-helper and shadow-utils because requires(pre) doesnt seems to work - use PWP theme - probes module using modprobe even if we are in install mode - fix typo in if condition - detect IDE only if /proc/ide exists (fix for kernel => 2.6.39), and move detection to the end - simplify mdv theme drakx-installer-binaries: - Don't depend on /sbin/init for now. - Since we switched to systemd and we don't want to include its whole deps, we choose the fast path and remove the use of init entirely since it's not really used. - ide_cd_mod doesnt exist anymore; kernel doesnt provides compressed module now %description Contains many Mandriva Linux applications simplifying users and administrators life on a Mandriva Linux machine. Nearly all of them work both under XFree (graphical environment) and in console (text environment), allowing easy distant work. - drakbug: interactive bug report tool - drakbug_report: help find bugs in DrakX - drakclock: date & time configurator - drakfloppy: boot disk creator - drakfont: import fonts in the system - draklog: show extracted information from the system logs - draksec: security options managment %package drakx-finish-install drakx-installer-advertising drakx-installer-binaries drakx-installer-binaries-probe drakx-installer-rescue drakx-installer-stage2 drakxtools drakxtools-backend drakxtools-curses drakxtools-http harddrake harddrake-ui Update: Mon Dec 05 11:53:57 2011 Importance: bugfix ID: MDVA-2011:087 URL: http://www.mandriva.com/security/advisories?name=MDVA-2011:087 %pre This is a bugfix and maintenance update of drakxtools, drakx-installer-stage2, drakx-installer-rescue, drakx-installer-binaries and drakx-installer-advertising-2010.1 that addresses the following issues: drakxtools: - fix /media/cdrom creation, enable nepomuk - add PWP text - configure network before bootloader installation - use $::prefix to get it working in install process - fix systemctl in installer - remove update steps - all services has not been migrated to systemd, so restore chkconfig in this case - use systemctl instead of chkconfig - enable networkmanager.service, fix kernel-firmware installation, remove /etc/hostname pre-configuration - no more server flavour for 32bits machines. - fix network test with missing perl lib Net/Ping.pm - revert to desktop586 (du to latest package), and install kernel server if ram is around 8Gb - be sure that kernel-firmware has been installed (since latest package requires changement...) - dont hide the networking step - Disable desktop choice, force KDE choice, even if Gnome is available - fix condition for modules compression test. - add rpm-helper and shadow-utils because requires(pre) doesnt seems to work - use PWP theme - increase right windows size - was not a good idea to use /sbin/modprobe in install mode... reverting, and doing uncompress using gzip only if modules ares gziped - fix typo in if condition - detect IDE only if /proc/ide exists (fix for kernel => 2.6.39), and move detection to the end - simplify mdv theme drakx-installer-rescue: - fix fakeroot usage for device nodes creation in rescue.sqfs - Since we switched to systemd and we don't want to include its whole deps, we choose the fast path and remove the use of init entirely since it's not really used. - modules names has changed (scsi_mod, sd_mod) - remove restore tools drakx-installer-advertising-2010.1: - update advertising (2011) drakx-installer-stage2: - fix network test with missing perl lib Net/Ping.pm - install kernel server if ram is around 8Gb - be sure that kernel-firmware has been installed (since latest package requires changement...) - dont hide the networking step - Disable desktop choice, force KDE choice, even if Gnome is available - fix condition for modules compression test - add rpm-helper and shadow-utils because requires(pre) doesnt seems to work - use PWP theme - probes module using modprobe even if we are in install mode - fix typo in if condition - detect IDE only if /proc/ide exists (fix for kernel => 2.6.39), and move detection to the end - simplify mdv theme drakx-installer-binaries: - Don't depend on /sbin/init for now. - Since we switched to systemd and we don't want to include its whole deps, we choose the fast path and remove the use of init entirely since it's not really used. - ide_cd_mod doesnt exist anymore; kernel doesnt provides compressed module now %description Contains many Mandriva Linux applications simplifying users and administrators life on a Mandriva Linux machine. Nearly all of them work both under XFree (graphical environment) and in console (text environment), allowing easy distant work. - drakbug: interactive bug report tool - drakbug_report: help find bugs in DrakX - drakclock: date & time configurator - drakfloppy: boot disk creator - drakfont: import fonts in the system - draklog: show extracted information from the system logs - draksec: security options managment %package fglrx-kernel-2.6.39.4-4.2-desktop fglrx-kernel-2.6.39.4-4.2-server fglrx-kernel-desktop-latest fglrx-kernel-server-latest kernel-desktop kernel-desktop-debuginfo kernel-desktop-devel kernel-desktop-devel-latest kernel-desktop-latest kernel-headers kernel-server kernel-server-debuginfo kernel-server-devel kernel-server-devel-latest kernel-server-latest kernel-source kernel-source-latest nvidia173-kernel-2.6.39.4-4.2-desktop nvidia173-kernel-2.6.39.4-4.2-server nvidia173-kernel-desktop-latest nvidia173-kernel-server-latest nvidia96xx-kernel-2.6.39.4-4.2-desktop nvidia96xx-kernel-2.6.39.4-4.2-server nvidia96xx-kernel-desktop-latest nvidia96xx-kernel-server-latest nvidia-current-kernel-2.6.39.4-4.2-desktop nvidia-current-kernel-2.6.39.4-4.2-server nvidia-current-kernel-desktop-latest nvidia-current-kernel-server-latest virtualbox-kernel-2.6.39.4-4.2-desktop virtualbox-kernel-2.6.39.4-4.2-server virtualbox-kernel-desktop-latest virtualbox-kernel-server-latest vpnclient-kernel-2.6.39.4-4.2-desktop vpnclient-kernel-2.6.39.4-4.2-server vpnclient-kernel-desktop-latest vpnclient-kernel-server-latest Update: Tue Dec 06 10:38:54 2011 Importance: bugfix ID: MDVA-2011:088 URL: http://www.mandriva.com/security/advisories?name=MDVA-2011:088 %pre This update contains the upgrade to the latest stable kernel 2.6.39 as shipped with Mandriva Linux 2011 Powerpack. The summary of the changes made during this release can be found at the usual places like http://kernelnewbies.org/Linux_2_6_39 It's worth noticing that for this release the BKL (big kernel lock) has been completely removed. Besides the mainline changes there's also some changes by Mandriva. - IDE old stack has been totally disabled: we're not using the old IDE drivers which were known to cause problems for some users with CD/DVD drives. - It includes the backport of the rtl8192se driver which was available on older kernels through a dkms (dkms-r8192se) (#64022) - Some fixes was backported from the 3.0 tree, see for details: http://permalink.gmane.org/gmane.linux.mandrake.cooker.devel/312832 Additionally binary kernel dkms modules for fglrx, nvidia173, nvidia-current, virtualbox, vpnclient is being provided. The nvidia-96xx driver version (96.43.19) was obsolete and incompatible with X.org 1.10. A new binary kernel dkms module version 96.43.20 is also being provided with this advisory to adddres this problem (#64727). %description %package fglrx-kernel-2.6.39.4-4.2-desktop fglrx-kernel-2.6.39.4-4.2-server fglrx-kernel-desktop-latest fglrx-kernel-server-latest kernel-desktop kernel-desktop-debuginfo kernel-desktop-devel kernel-desktop-devel-latest kernel-desktop-latest kernel-headers kernel-server kernel-server-debuginfo kernel-server-devel kernel-server-devel-latest kernel-server-latest kernel-source kernel-source-latest nvidia173-kernel-2.6.39.4-4.2-desktop nvidia173-kernel-2.6.39.4-4.2-server nvidia173-kernel-desktop-latest nvidia173-kernel-server-latest nvidia96xx-kernel-2.6.39.4-4.2-desktop nvidia96xx-kernel-2.6.39.4-4.2-server nvidia96xx-kernel-desktop-latest nvidia96xx-kernel-server-latest nvidia-current-kernel-2.6.39.4-4.2-desktop nvidia-current-kernel-2.6.39.4-4.2-server nvidia-current-kernel-desktop-latest nvidia-current-kernel-server-latest virtualbox-kernel-2.6.39.4-4.2-desktop virtualbox-kernel-2.6.39.4-4.2-server virtualbox-kernel-desktop-latest virtualbox-kernel-server-latest vpnclient-kernel-2.6.39.4-4.2-desktop vpnclient-kernel-2.6.39.4-4.2-server vpnclient-kernel-desktop-latest vpnclient-kernel-server-latest Update: Tue Dec 06 10:40:02 2011 Importance: bugfix ID: MDVA-2011:088 URL: http://www.mandriva.com/security/advisories?name=MDVA-2011:088 %pre This update contains the upgrade to the latest stable kernel 2.6.39 as shipped with Mandriva Linux 2011 Powerpack. The summary of the changes made during this release can be found at the usual places like http://kernelnewbies.org/Linux_2_6_39 It's worth noticing that for this release the BKL (big kernel lock) has been completely removed. Besides the mainline changes there's also some changes by Mandriva. - IDE old stack has been totally disabled: we're not using the old IDE drivers which were known to cause problems for some users with CD/DVD drives. - It includes the backport of the rtl8192se driver which was available on older kernels through a dkms (dkms-r8192se) (#64022) - Some fixes was backported from the 3.0 tree, see for details: http://permalink.gmane.org/gmane.linux.mandrake.cooker.devel/312832 Additionally binary kernel dkms modules for fglrx, nvidia173, nvidia-current, virtualbox, vpnclient is being provided. The nvidia-96xx driver version (96.43.19) was obsolete and incompatible with X.org 1.10. A new binary kernel dkms module version 96.43.20 is also being provided with this advisory to adddres this problem (#64727). %description %package proftpd proftpd-devel proftpd-mod_autohost proftpd-mod_ban proftpd-mod_case proftpd-mod_ctrls_admin proftpd-mod_gss proftpd-mod_ifsession proftpd-mod_ldap proftpd-mod_load proftpd-mod_quotatab proftpd-mod_quotatab_file proftpd-mod_quotatab_ldap proftpd-mod_quotatab_radius proftpd-mod_quotatab_sql proftpd-mod_radius proftpd-mod_ratio proftpd-mod_rewrite proftpd-mod_sftp proftpd-mod_sftp_pam proftpd-mod_sftp_sql proftpd-mod_shaper proftpd-mod_site_misc proftpd-mod_sql proftpd-mod_sql_mysql proftpd-mod_sql_passwd proftpd-mod_sql_postgres proftpd-mod_sql_sqlite proftpd-mod_time proftpd-mod_tls proftpd-mod_tls_shmcache proftpd-mod_vroot proftpd-mod_wrap proftpd-mod_wrap_file proftpd-mod_wrap_sql Update: Wed Dec 07 15:31:02 2011 Importance: security ID: MDVSA-2011:181 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2011:181 %pre A vulnerability was discovered and fixed in proftpd: Use-after-free vulnerability in the Response API in ProFTPD before 1.3.3g allows remote authenticated users to execute arbitrary code via vectors involving an error that occurs after an FTP data transfer (CVE-2011-4130). The updated packages have been upgraded to the latest version 1.3.3g which is not vulnerable to this issue. %description ProFTPd is an enhanced FTP server with a focus toward simplicity, security, and ease of configuration. It features a very Apache-like configuration syntax, and a highly customizable server infrastructure, including support for multiple 'virtual' FTP servers, anonymous FTP, and permission-based directory visibility. This version supports both standalone and xinetd operation. %package dhcp-client dhcp-common dhcp-devel dhcp-doc dhcp-relay dhcp-server Update: Thu Dec 08 16:10:37 2011 Importance: security ID: MDVSA-2011:182 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2011:182 %pre A vulnerability has been discovered and corrected in dhcp: dhcpd in ISC DHCP 4.x before 4.2.3-P1 and 4.1-ESV before 4.1-ESV-R4 does not properly handle regular expressions in dhcpd.conf, which allows remote attackers to cause a denial of service (daemon crash) via a crafted request packet (CVE-2011-4539). The updated packages have been patched to correct this issue. %description DHCP (Dynamic Host Configuration Protocol) is a protocol which allows individual devices on an IP network to get their own network configuration information (IP address, subnetmask, broadcast address, etc.) from a DHCP server. The overall purpose of DHCP is to make it easier to administer a large network. The dhcp package includes the DHCP server and a DHCP relay agent. You will also need to install the dhcp-client or dhcpcd package, or pump or dhcpxd, which provides the DHCP client daemon, on client machines. If you want the DHCP server and/or relay, you will also need to install the dhcp-server and/or dhcp-relay packages. %package finch lib64finch0 lib64purple0 lib64purple-devel pidgin pidgin-bonjour pidgin-client pidgin-gevolution pidgin-i18n pidgin-meanwhile pidgin-perl pidgin-plugins pidgin-silc pidgin-tcl Update: Sat Dec 10 21:56:55 2011 Importance: security ID: MDVSA-2011:183 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2011:183 %pre Multiple vulnerabilities has been discovered and corrected in pidgin: When receiving various stanzas related to voice and video chat, the XMPP protocol plugin failed to ensure that the incoming message contained all required fields, and would crash if certain fields were missing. When receiving various messages related to requesting or receiving authorization for adding a buddy to a buddy list, the oscar protocol plugin failed to validate that a piece of text was UTF-8. In some cases invalid UTF-8 data would lead to a crash (CVE-2011-4601). When receiving various incoming messages, the SILC protocol plugin failed to validate that a piece of text was UTF-8. In some cases invalid UTF-8 data would lead to a crash (CVE-2011-3594). This update provides pidgin 2.10.1, which is not vulnerable to these issues. %description Pidgin allows you to talk to anyone using a variety of messaging protocols including AIM, MSN, Yahoo!, Jabber, Bonjour, Gadu-Gadu, ICQ, IRC, Novell Groupwise, QQ, Lotus Sametime, SILC, Simple and Zephyr. These protocols are implemented using a modular, easy to use design. To use a protocol, just add an account using the account editor. Pidgin supports many common features of other clients, as well as many unique features, such as perl scripting, TCL scripting and C plugins. Pidgin is not affiliated with or endorsed by America Online, Inc., Microsoft Corporation, Yahoo! Inc., or ICQ Inc. %package krb5 krb5-pkinit-openssl krb5-server krb5-server-ldap krb5-workstation lib64krb53 lib64krb53-devel Update: Mon Dec 12 12:55:33 2011 Importance: security ID: MDVSA-2011:184 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2011:184 %pre A vulnerability has been discovered and corrected in krb5: The process_tgs_req function in do_tgs_req.c in the Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) 1.9 through 1.9.2 allows remote authenticated users to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted TGS request that triggers an error other than the KRB5_KDB_NOENTRY error (CVE-2011-1530). The updated packages have been patched to correct this issue. %description Kerberos V5 is a trusted-third-party network authentication system, which can improve your network's security by eliminating the insecure practice of cleartext passwords. %package lib64cap2 lib64cap-devel libcap-utils pam_cap Update: Mon Dec 12 14:18:42 2011 Importance: security ID: MDVSA-2011:185 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2011:185 %pre A vulnerability has been discovered and corrected in libcap: capsh did not chdir(/) after callling chroot(). Programs could therefore access the current directory outside of the chroot (CVE-2011-4099). The updated packages have been patched to correct this issue. %description libcap is a library for getting and setting POSIX.1e (formerly POSIX 6) draft 15 capabilities. %package lib64qt3support4 lib64qt4-devel lib64qtclucene4 lib64qtcore4 lib64qtdbus4 lib64qtdeclarative4 lib64qtdesigner4 lib64qtgui4 lib64qthelp4 lib64qtmultimedia4 lib64qtnetwork4 lib64qtopengl4 lib64qtscript4 lib64qtscripttools4 lib64qtsql4 lib64qtsvg4 lib64qttest4 lib64qtwebkit4 lib64qtxml4 lib64qtxmlpatterns4 libreoffice libreoffice-base libreoffice-calc libreoffice-common libreoffice-core libreoffice-devel libreoffice-devel-doc libreoffice-draw libreoffice-filter-binfilter libreoffice-gnome libreoffice-help-bg libreoffice-help-bn libreoffice-help-bs libreoffice-help-ca libreoffice-help-cs libreoffice-help-da libreoffice-help-de libreoffice-help-dz libreoffice-help-el libreoffice-help-en_GB libreoffice-help-en_US libreoffice-help-es libreoffice-help-et libreoffice-help-eu libreoffice-help-fi libreoffice-help-fr libreoffice-help-gl libreoffice-help-gu libreoffice-help-he libreoffice-help-hi libreoffice-help-hr libreoffice-help-hu libreoffice-help-it libreoffice-help-ja libreoffice-help-ko libreoffice-help-mk libreoffice-help-nb libreoffice-help-nl libreoffice-help-nn libreoffice-help-pl libreoffice-help-pt libreoffice-help-pt_BR libreoffice-help-ru libreoffice-help-si libreoffice-help-sk libreoffice-help-sl libreoffice-help-sv libreoffice-help-tr libreoffice-help-uk libreoffice-help-zh_CN libreoffice-help-zh_TW libreoffice-impress libreoffice-java-common libreoffice-kde4 libreoffice-l10n-af libreoffice-l10n-ar libreoffice-l10n-as libreoffice-l10n-bg libreoffice-l10n-bn libreoffice-l10n-br libreoffice-l10n-bs libreoffice-l10n-ca libreoffice-l10n-cs libreoffice-l10n-cy libreoffice-l10n-da libreoffice-l10n-de libreoffice-l10n-dz libreoffice-l10n-el libreoffice-l10n-en_GB libreoffice-l10n-es libreoffice-l10n-et libreoffice-l10n-eu libreoffice-l10n-fa libreoffice-l10n-fi libreoffice-l10n-fr libreoffice-l10n-ga libreoffice-l10n-gl libreoffice-l10n-gu libreoffice-l10n-he libreoffice-l10n-hi libreoffice-l10n-hr libreoffice-l10n-hu libreoffice-l10n-it libreoffice-l10n-ja libreoffice-l10n-kn libreoffice-l10n-ko libreoffice-l10n-lt libreoffice-l10n-lv libreoffice-l10n-mai libreoffice-l10n-mk libreoffice-l10n-ml libreoffice-l10n-mr libreoffice-l10n-nb libreoffice-l10n-nl libreoffice-l10n-nn libreoffice-l10n-nr libreoffice-l10n-nso libreoffice-l10n-or libreoffice-l10n-pa_IN libreoffice-l10n-pl libreoffice-l10n-pt libreoffice-l10n-pt_BR libreoffice-l10n-ro libreoffice-l10n-ru libreoffice-l10n-sh libreoffice-l10n-si libreoffice-l10n-sk libreoffice-l10n-sl libreoffice-l10n-sr libreoffice-l10n-ss libreoffice-l10n-st libreoffice-l10n-sv libreoffice-l10n-ta libreoffice-l10n-te libreoffice-l10n-th libreoffice-l10n-tn libreoffice-l10n-tr libreoffice-l10n-ts libreoffice-l10n-uk libreoffice-l10n-ve libreoffice-l10n-xh libreoffice-l10n-zh_CN libreoffice-l10n-zh_TW libreoffice-l10n-zu libreoffice-math libreoffice-openclipart libreoffice-pdfimport libreoffice-presentation-minimizer libreoffice-presenter-screen libreoffice-pyuno libreoffice-style-crystal libreoffice-style-galaxy libreoffice-style-hicontrast libreoffice-style-oxygen libreoffice-style-tango libreoffice-testtool libreoffice-wiki-publisher libreoffice-writer qt4-accessibility-plugin qt4-assistant qt4-common qt4-database-plugin-mysql qt4-database-plugin-pgsql qt4-database-plugin-sqlite qt4-database-plugin-tds qt4-demos qt4-designer qt4-designer-plugin-qt3support qt4-designer-plugin-webkit qt4-doc qt4-examples qt4-graphicssystems-plugin qt4-linguist qt4-qdoc3 qt4-qmlviewer qt4-qtconfig qt4-qtdbus qt4-qvfb qt4-xmlpatterns Update: Mon Dec 12 22:13:39 2011 Importance: bugfix ID: MDVA-2011:089 URL: http://www.mandriva.com/security/advisories?name=MDVA-2011:089 %pre This update fixes the following problems in LibreOffice 3.4.3: * Images of help descriptions are not presented in the LibreOffice help browser (#64789). * LibreOffice crashes during extensions installation using the Online method (#64792). This update also brings new icons to LibreOffice Math and StartCenter. %description Qt is a GUI software toolkit which simplifies the task of writing and maintaining GUI (Graphical User Interface) applications for the X Window System. Qt is written in C++ and is fully object-oriented. This package contains the shared library needed to run Qt applications, as well as the README files for Qt. %package lib64qt3support4 lib64qt4-devel lib64qtclucene4 lib64qtcore4 lib64qtdbus4 lib64qtdeclarative4 lib64qtdesigner4 lib64qtgui4 lib64qthelp4 lib64qtmultimedia4 lib64qtnetwork4 lib64qtopengl4 lib64qtscript4 lib64qtscripttools4 lib64qtsql4 lib64qtsvg4 lib64qttest4 lib64qtwebkit4 lib64qtxml4 lib64qtxmlpatterns4 libreoffice libreoffice-base libreoffice-calc libreoffice-common libreoffice-core libreoffice-devel libreoffice-devel-doc libreoffice-draw libreoffice-filter-binfilter libreoffice-gnome libreoffice-help-bg libreoffice-help-bn libreoffice-help-bs libreoffice-help-ca libreoffice-help-cs libreoffice-help-da libreoffice-help-de libreoffice-help-dz libreoffice-help-el libreoffice-help-en_GB libreoffice-help-en_US libreoffice-help-es libreoffice-help-et libreoffice-help-eu libreoffice-help-fi libreoffice-help-fr libreoffice-help-gl libreoffice-help-gu libreoffice-help-he libreoffice-help-hi libreoffice-help-hr libreoffice-help-hu libreoffice-help-it libreoffice-help-ja libreoffice-help-ko libreoffice-help-mk libreoffice-help-nb libreoffice-help-nl libreoffice-help-nn libreoffice-help-pl libreoffice-help-pt libreoffice-help-pt_BR libreoffice-help-ru libreoffice-help-si libreoffice-help-sk libreoffice-help-sl libreoffice-help-sv libreoffice-help-tr libreoffice-help-uk libreoffice-help-zh_CN libreoffice-help-zh_TW libreoffice-impress libreoffice-java-common libreoffice-kde4 libreoffice-l10n-af libreoffice-l10n-ar libreoffice-l10n-as libreoffice-l10n-bg libreoffice-l10n-bn libreoffice-l10n-br libreoffice-l10n-bs libreoffice-l10n-ca libreoffice-l10n-cs libreoffice-l10n-cy libreoffice-l10n-da libreoffice-l10n-de libreoffice-l10n-dz libreoffice-l10n-el libreoffice-l10n-en_GB libreoffice-l10n-es libreoffice-l10n-et libreoffice-l10n-eu libreoffice-l10n-fa libreoffice-l10n-fi libreoffice-l10n-fr libreoffice-l10n-ga libreoffice-l10n-gl libreoffice-l10n-gu libreoffice-l10n-he libreoffice-l10n-hi libreoffice-l10n-hr libreoffice-l10n-hu libreoffice-l10n-it libreoffice-l10n-ja libreoffice-l10n-kn libreoffice-l10n-ko libreoffice-l10n-lt libreoffice-l10n-lv libreoffice-l10n-mai libreoffice-l10n-mk libreoffice-l10n-ml libreoffice-l10n-mr libreoffice-l10n-nb libreoffice-l10n-nl libreoffice-l10n-nn libreoffice-l10n-nr libreoffice-l10n-nso libreoffice-l10n-or libreoffice-l10n-pa_IN libreoffice-l10n-pl libreoffice-l10n-pt libreoffice-l10n-pt_BR libreoffice-l10n-ro libreoffice-l10n-ru libreoffice-l10n-sh libreoffice-l10n-si libreoffice-l10n-sk libreoffice-l10n-sl libreoffice-l10n-sr libreoffice-l10n-ss libreoffice-l10n-st libreoffice-l10n-sv libreoffice-l10n-ta libreoffice-l10n-te libreoffice-l10n-th libreoffice-l10n-tn libreoffice-l10n-tr libreoffice-l10n-ts libreoffice-l10n-uk libreoffice-l10n-ve libreoffice-l10n-xh libreoffice-l10n-zh_CN libreoffice-l10n-zh_TW libreoffice-l10n-zu libreoffice-math libreoffice-openclipart libreoffice-pdfimport libreoffice-presentation-minimizer libreoffice-presenter-screen libreoffice-pyuno libreoffice-style-crystal libreoffice-style-galaxy libreoffice-style-hicontrast libreoffice-style-oxygen libreoffice-style-tango libreoffice-testtool libreoffice-wiki-publisher libreoffice-writer qt4-accessibility-plugin qt4-assistant qt4-common qt4-database-plugin-mysql qt4-database-plugin-pgsql qt4-database-plugin-sqlite qt4-database-plugin-tds qt4-demos qt4-designer qt4-designer-plugin-qt3support qt4-designer-plugin-webkit qt4-doc qt4-examples qt4-graphicssystems-plugin qt4-linguist qt4-qdoc3 qt4-qmlviewer qt4-qtconfig qt4-qtdbus qt4-qvfb qt4-xmlpatterns Update: Tue Dec 13 15:17:27 2011 Importance: bugfix ID: MDVA-2011:089 URL: http://www.mandriva.com/security/advisories?name=MDVA-2011:089 %pre This update fixes the following problems in LibreOffice 3.4.3: * Images of help descriptions are not presented in the LibreOffice help browser (#64789). * LibreOffice crashes during extensions installation using the Online method (#64792). This update also brings new icons to LibreOffice Math and StartCenter. %description Qt is a GUI software toolkit which simplifies the task of writing and maintaining GUI (Graphical User Interface) applications for the X Window System. Qt is written in C++ and is fully object-oriented. This package contains the shared library needed to run Qt applications, as well as the README files for Qt. %package rosa-launcher Update: Tue Dec 13 16:25:20 2011 Importance: bugfix ID: MDVA-2011:090 URL: http://www.mandriva.com/security/advisories?name=MDVA-2011:090 %pre This is a bugfix and maintenance update of the rosa-launcher package(s) that addresses the following issues: * Fixed bug with empty icons in the recent application section after uninstalling [#64381] * Added resetting of scrollbar position after tab changing [#64390] * Fixed bug with limiting of mouse wheel scrolling and content repositioning due to scrollbar hiding on tab change. %description ROSA Desktop Application Launcher %package rosapanel Update: Tue Dec 13 16:29:21 2011 Importance: bugfix ID: MDVA-2011:091 URL: http://www.mandriva.com/security/advisories?name=MDVA-2011:091 %pre This is a bugfix and maintenance update of the rosapanel package(s) that addresses the following issues: * Added possibility to launch new instance of application [#64597] * Fixed icons rotating in the middle zone at the top edge [#64382] %description ROSA panel %package lib64xml2_2 lib64xml2-devel libxml2-python libxml2-utils Update: Thu Dec 15 17:10:32 2011 Importance: security ID: MDVSA-2011:188 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2011:188 %pre Multiple vulnerabilities has been discovered and corrected in libxml2: Off-by-one error in libxml allows remote attackers to execute arbitrary code or cause a denial of service (heap-based buffer overflow and application crash) via a crafted web site CVE-2011-0216). libxml2 allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors (CVE-2011-3905). The updated packages have been patched to correct these issues. %description This library allows you to manipulate XML files. It includes support for reading, modifying and writing XML and HTML files. There is DTDs support: this includes parsing and validation even with complex DtDs, either at parse time or later once the document has been modified. The output can be a simple SAX stream or and in-memory DOM-like representations. In this case one can use the built-in XPath and XPointer implementation to select subnodes or ranges. A flexible Input/Output mechanism is available, with existing HTTP and FTP modules and combined to a URI library. %package jasper lib64jasper1 lib64jasper-devel lib64jasper-static-devel Update: Fri Dec 16 11:28:55 2011 Importance: security ID: MDVSA-2011:189 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2011:189 %pre Multiple vulnerabilities has been discovered and corrected in jasper: Heap-based buffer overflow in the jpc_cox_getcompparms function in libjasper/jpc/jpc_cs.c in JasPer 1.900.1 allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted numrlvls value in a JPEG2000 file (CVE-2011-4516). The jpc_crg_getparms function in libjasper/jpc/jpc_cs.c in JasPer 1.900.1 uses an incorrect data type during a certain size calculation, which allows remote attackers to trigger a heap-based buffer overflow and execute arbitrary code, or cause a denial of service (heap memory corruption), via a malformed JPEG2000 file (CVE-2011-4517). The updated packages have been patched to correct these issues. %description JasPer is a software-based implementation of the codec specified in the emerging JPEG-2000 Part-1 standard (i.e., ISO/IEC 15444-1). This package contains tools for working with JPEG-2000 images. %package bsdcpio bsdtar lib64archive2 lib64archive-devel Update: Sun Dec 18 17:28:57 2011 Importance: security ID: MDVSA-2011:190 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2011:190 %pre Two heap-based buffer overflow flaws were discovered in libarchive. If a user were tricked into expanding a specially-crafted ISO 9660 CD-ROM image or tar archive with an application using libarchive, it could cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application (CVE-2011-1777, CVE-2011-1778). The updated packages have been patched to correct these issues. %description Libarchive is a programming library that can create and read several different streaming archive formats, including most popular tar variants and several cpio formats. It can also write shar archives and read ISO9660 CDROM images and ZIP archives. The bsdtar program is an implementation of tar(1) that is built on top of libarchive. It started as a test harness, but has grown and is now the standard system tar for FreeBSD 5 and 6. %package rosa-icons Update: Sun Dec 18 19:17:04 2011 Importance: bugfix ID: MDVA-2011:092 URL: http://www.mandriva.com/security/advisories?name=MDVA-2011:092 %pre This is a bugfix and maintenance update of the rosa-icons package(s) that addresses the following issues: Updated 13 icons for KolourPaint, Gwenwiew, Ark, KPPP, kTorrent, Okular, K3b, KWalletManager, KSysGuard, KNotes, Konsole, KCalc and KSnapshot %description ROSA icons theme. Designed for Mandriva. Based on the original icon theme Elementary by Daniel Fore (Dan Rabbit). %package psmisc Update: Mon Dec 19 10:16:43 2011 Importance: bugfix ID: MDVA-2011:093 URL: http://www.mandriva.com/security/advisories?name=MDVA-2011:093 %pre This is a bugfix and maintenance update of the psmisc package(s) that addresses the following issue(s): * Fixed bug with fuser is returning an incorrect return value when using -s option (#64846) %description The psmisc package contains utilities for managing processes on your system: pstree, killall and fuser. The pstree command displays a tree structure of all of the running processes on your system. The killall command sends a specified signal (SIGTERM if nothing is specified) to processes identified by name. The fuser command identifies the PIDs of processes that are using specified files or filesystems. %package lib64python2.7 lib64python-devel python python-docs tkinter tkinter-apps Update: Mon Dec 19 12:21:29 2011 Importance: bugfix ID: MDVA-2011:094 URL: http://www.mandriva.com/security/advisories?name=MDVA-2011:094 %pre This is a bugfix and maintenance update of the python package(s) that addresses the following issue(s): sys.plaform should return the name of the platform where the python binary had been built. It usually returns 'linux2'. However since the kernel has increased its major number to 3, building python on platforms running those new kernels would make sys.platform return 'linux3' (#64889). %description Python is an interpreted, interactive, object-oriented programming language often compared to Tcl, Perl, Scheme or Java. Python includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems (X11, Motif, Tk, Mac and MFC). Programmers can write new built-in modules for Python in C or C++. Python can be used as an extension language for applications that need a programmable interface. This package contains most of the standard Python modules, as well as modules for interfacing to the Tix widget set for Tk and RPM. Note that documentation for Python is provided in the python-docs package. %package dkms dkms-minimal Update: Tue Dec 20 14:57:45 2011 Importance: bugfix ID: MDVA-2011:095 URL: http://www.mandriva.com/security/advisories?name=MDVA-2011:095 %pre This is a bugfix and maintenance update of the dkms package(s) that addresses the following issue(s): The next kernel release (ie 3.1.6) and above will have their devel packages improved: include/version.h was missing, make mrproper was failing and more. %description This package contains the framework for the Dynamic Kernel Module Support (DKMS) method for installing module RPMS as originally developed by the Dell Computer Corporation. This package is intended for building binary kernel modules with dkms source packages installed %package firefox firefox-af firefox-ar firefox-ast firefox-be firefox-bg firefox-bn firefox-br firefox-bs firefox-ca firefox-cs firefox-cy firefox-da firefox-de firefox-devel firefox-el firefox-en_GB firefox-eo firefox-es_AR firefox-es_ES firefox-et firefox-eu firefox-fa firefox-fi firefox-fr firefox-fy firefox-ga_IE firefox-gd firefox-gl firefox-gu_IN firefox-he firefox-hi firefox-hr firefox-hu firefox-hy firefox-id firefox-is firefox-it firefox-ja firefox-kk firefox-kn firefox-ko firefox-ku firefox-lg firefox-lt firefox-lv firefox-mai firefox-mk firefox-ml firefox-mr firefox-nb_NO firefox-nl firefox-nn_NO firefox-nso firefox-or firefox-pa_IN firefox-pl firefox-pt_BR firefox-pt_PT firefox-ro firefox-ru firefox-si firefox-sk firefox-sl firefox-sq firefox-sr firefox-sv_SE firefox-ta firefox-te firefox-th firefox-tr firefox-uk firefox-vi firefox-zh_CN firefox-zh_TW firefox-zu mozilla-thunderbird mozilla-thunderbird-ar mozilla-thunderbird-ca mozilla-thunderbird-cs mozilla-thunderbird-da mozilla-thunderbird-de mozilla-thunderbird-en_GB mozilla-thunderbird-enigmail mozilla-thunderbird-enigmail-ar mozilla-thunderbird-enigmail-ca mozilla-thunderbird-enigmail-cs mozilla-thunderbird-enigmail-de mozilla-thunderbird-enigmail-el mozilla-thunderbird-enigmail-es mozilla-thunderbird-enigmail-fi mozilla-thunderbird-enigmail-fr mozilla-thunderbird-enigmail-it mozilla-thunderbird-enigmail-ja mozilla-thunderbird-enigmail-ko mozilla-thunderbird-enigmail-nb mozilla-thunderbird-enigmail-nl mozilla-thunderbird-enigmail-pl mozilla-thunderbird-enigmail-pt mozilla-thunderbird-enigmail-pt_BR mozilla-thunderbird-enigmail-ru mozilla-thunderbird-enigmail-sl mozilla-thunderbird-enigmail-sv mozilla-thunderbird-enigmail-tr mozilla-thunderbird-enigmail-vi mozilla-thunderbird-enigmail-zh_CN mozilla-thunderbird-enigmail-zh_TW mozilla-thunderbird-es_AR mozilla-thunderbird-es_ES mozilla-thunderbird-et mozilla-thunderbird-eu mozilla-thunderbird-fi mozilla-thunderbird-fr mozilla-thunderbird-fy mozilla-thunderbird-ga mozilla-thunderbird-gd mozilla-thunderbird-gl mozilla-thunderbird-he mozilla-thunderbird-hu mozilla-thunderbird-is mozilla-thunderbird-it mozilla-thunderbird-ja mozilla-thunderbird-ko mozilla-thunderbird-lightning mozilla-thunderbird-lt mozilla-thunderbird-nb_NO mozilla-thunderbird-nl mozilla-thunderbird-nn_NO mozilla-thunderbird-pl mozilla-thunderbird-pt_BR mozilla-thunderbird-pt_PT mozilla-thunderbird-ru mozilla-thunderbird-si mozilla-thunderbird-sk mozilla-thunderbird-sl mozilla-thunderbird-sq mozilla-thunderbird-sv_SE mozilla-thunderbird-tr mozilla-thunderbird-uk mozilla-thunderbird-zh_TW nsinstall Update: Fri Dec 23 22:40:10 2011 Importance: security ID: MDVSA-2011:192 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2011:192 %pre Security issues were identified and fixed in mozilla firefox and thunderbird: The SVG implementation in Mozilla Firefox 8.0, Thunderbird 8.0, and SeaMonkey 2.5 does not properly interact with DOMAttrModified event handlers, which allows remote attackers to cause a denial of service (out-of-bounds memory access) or possibly have unspecified other impact via vectors involving removal of SVG elements (CVE-2011-3658). Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 4.x through 8.0, Thunderbird 5.0 through 8.0, and SeaMonkey before 2.6 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors that trigger a compartment mismatch associated with the nsDOMMessageEvent::GetData function, and unknown other vectors (CVE-2011-3660). YARR, as used in Mozilla Firefox 4.x through 8.0, Thunderbird 5.0 through 8.0, and SeaMonkey before 2.6, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted JavaScript (CVE-2011-3661). Mozilla Firefox 4.x through 8.0, Thunderbird 5.0 through 8.0, and SeaMonkey before 2.6 allow remote attackers to capture keystrokes entered on a web page by using SVG animation accessKey events within that web page (CVE-2011-3663). Mozilla Firefox 4.x through 8.0, Thunderbird 5.0 through 8.0, and SeaMonkey before 2.6 allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via an Ogg VIDEO element that is not properly handled after scaling (CVE-2011-3665). %description Mozilla Thunderbird is a full-featured email, RSS and newsgroup client that makes emailing safer, faster and easier than ever before. %package squid squid-cachemgr Update: Tue Dec 27 11:14:42 2011 Importance: security ID: MDVSA-2011:193 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2011:193 %pre A vulnerability has been discovered and corrected in squid: The idnsGrokReply function in Squid before 3.1.16 does not properly free memory, which allows remote attackers to cause a denial of service (daemon abort) via a DNS reply containing a CNAME record that references another CNAME record that contains an empty A record (CVE-2011-4096). The updated packages have been patched to correct this issue. %description Squid is a high-performance proxy caching server for web clients, supporting FTP, gopher, and HTTP data objects over IPv4 or IPv6. Unlike traditional caching software, Squid handles all requests in a single, non-blocking, asynchronous process. Squid keeps meta data and especially hot objects cached in RAM, caches DNS lookups, supports non-blocking DNS lookups, and implements negative caching of failed requests. Squid supports SSL, extensive access controls, and full request logging. By using the lightweight Internet Cache Protocol (ICP) and HTTP Cache Protocol (HTCP) Squid caches can be arranged in a hierarchy or mesh for additional bandwidth savings. Install squid if you need a proxy caching server. This package defaults to a maximum of 8192 filedescriptors. You can change these values at build time by using for example: --define 'maxfiles 4096' The package was built to support a maximum of 8192 filedescriptors. You can build squid with some conditional build swithes; (ie. use with rpm --rebuild): --with[out] test Initiate the test suite %package icu icu-doc lib64icu48 lib64icu-devel Update: Tue Dec 27 12:01:32 2011 Importance: security ID: MDVSA-2011:194 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2011:194 %pre A vulnerability has been discovered and corrected in icu: A stack-based buffer overflow flaw was found in the way ICU performed variant canonicalization for some locale identifiers. If a specially-crafted locale representation was opened in an application linked against ICU, it could cause the application to crash or, possibly, execute arbitrary code with the privileges of the user running the application (CVE-2011-4599). The updated packages have been patched to correct this issue. %description The International Components for Unicode (ICU) libraries provide robust and full-featured Unicode services on a wide variety of platforms. ICU supports the most current version of the Unicode standard, and they provide support for supplementary Unicode characters (needed for GB 18030 repertoire support). As computing environments become more heterogeneous, software portability becomes more important. ICU lets you produce the same results across all the various platforms you support, without sacrificing performance. It offers great flexibility to extend and customize the supplied services, which include: * Text: Unicode text handling, full character properties and character set conversions (500+ codepages) * Analysis: Unicode regular expressions; full Unicode sets; character, word and line boundaries * Comparison: Language sensitive collation and searching * Transformations: normalization, upper/lowercase, script transliterations (50+ pairs) * Locales: Comprehensive locale data (230+) and resource bundle architecture * Complex Text Layout: Arabic, Hebrew, Indic and Thai * Time: Multi-calendar and time zone * Formatting and Parsing: dates, times, numbers, currencies, messages and rule based %package firefox firefox-af firefox-ar firefox-ast firefox-be firefox-bg firefox-bn firefox-br firefox-bs firefox-ca firefox-cs firefox-cy firefox-da firefox-de firefox-devel firefox-el firefox-en_GB firefox-eo firefox-es_AR firefox-es_ES firefox-et firefox-eu firefox-fa firefox-fi firefox-fr firefox-fy firefox-ga_IE firefox-gd firefox-gl firefox-gu_IN firefox-he firefox-hi firefox-hr firefox-hu firefox-hy firefox-id firefox-is firefox-it firefox-ja firefox-kk firefox-kn firefox-ko firefox-ku firefox-lg firefox-lt firefox-lv firefox-mai firefox-mk firefox-ml firefox-mr firefox-nb_NO firefox-nl firefox-nn_NO firefox-nso firefox-or firefox-pa_IN firefox-pl firefox-pt_BR firefox-pt_PT firefox-ro firefox-ru firefox-si firefox-sk firefox-sl firefox-sq firefox-sr firefox-sv_SE firefox-ta firefox-te firefox-th firefox-tr firefox-uk firefox-vi firefox-zh_CN firefox-zh_TW firefox-zu mozilla-thunderbird mozilla-thunderbird-ar mozilla-thunderbird-ca mozilla-thunderbird-cs mozilla-thunderbird-da mozilla-thunderbird-de mozilla-thunderbird-en_GB mozilla-thunderbird-enigmail mozilla-thunderbird-enigmail-ar mozilla-thunderbird-enigmail-ca mozilla-thunderbird-enigmail-cs mozilla-thunderbird-enigmail-de mozilla-thunderbird-enigmail-el mozilla-thunderbird-enigmail-es mozilla-thunderbird-enigmail-fi mozilla-thunderbird-enigmail-fr mozilla-thunderbird-enigmail-it mozilla-thunderbird-enigmail-ja mozilla-thunderbird-enigmail-ko mozilla-thunderbird-enigmail-nb mozilla-thunderbird-enigmail-nl mozilla-thunderbird-enigmail-pl mozilla-thunderbird-enigmail-pt mozilla-thunderbird-enigmail-pt_BR mozilla-thunderbird-enigmail-ru mozilla-thunderbird-enigmail-sl mozilla-thunderbird-enigmail-sv mozilla-thunderbird-enigmail-tr mozilla-thunderbird-enigmail-vi mozilla-thunderbird-enigmail-zh_CN mozilla-thunderbird-enigmail-zh_TW mozilla-thunderbird-es_AR mozilla-thunderbird-es_ES mozilla-thunderbird-et mozilla-thunderbird-eu mozilla-thunderbird-fi mozilla-thunderbird-fr mozilla-thunderbird-fy mozilla-thunderbird-ga mozilla-thunderbird-gd mozilla-thunderbird-gl mozilla-thunderbird-he mozilla-thunderbird-hu mozilla-thunderbird-is mozilla-thunderbird-it mozilla-thunderbird-ja mozilla-thunderbird-ko mozilla-thunderbird-lightning mozilla-thunderbird-lt mozilla-thunderbird-nb_NO mozilla-thunderbird-nl mozilla-thunderbird-nn_NO mozilla-thunderbird-pl mozilla-thunderbird-pt_BR mozilla-thunderbird-pt_PT mozilla-thunderbird-ru mozilla-thunderbird-si mozilla-thunderbird-sk mozilla-thunderbird-sl mozilla-thunderbird-sq mozilla-thunderbird-sv_SE mozilla-thunderbird-tr mozilla-thunderbird-uk mozilla-thunderbird-zh_TW nsinstall Update: Tue Dec 27 14:41:40 2011 Importance: bugfix ID: MDVA-2011:096 URL: http://www.mandriva.com/security/advisories?name=MDVA-2011:096 %pre This is a bugfix and maintenance update of the mozilla firefox and thunderbird package(s) that addresses the following issue(s): Installed languages and extensions were disabled per default which was not intended (#64991). Firefox and Thunderbird 9.0.1 addresses a possible crash upon startup. %description Mozilla Thunderbird is a full-featured email, RSS and newsgroup client that makes emailing safer, faster and easier than ever before. %package krb5-appl-clients krb5-appl-servers netkit-telnet netkit-telnet-server Update: Wed Dec 28 12:46:35 2011 Importance: security ID: MDVSA-2011:195 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2011:195 %pre A vulnerability has been discovered and corrected in krb5-appl, heimdal and netkit-telnet: An unauthenticated remote attacker can cause a buffer overflow and probably execute arbitrary code with the privileges of the telnet daemon (CVE-2011-4862). In Mandriva the telnetd daemon from the netkit-telnet-server package does not have an initscript to start and stop the service, however one could rather easily craft an initscript or start the service by other means rendering the system vulnerable to this issue. The updated packages have been patched to correct this issue. %description Telnet is a popular protocol for logging into remote systems over the Internet. The telnet package provides a command line telnet client. %package ipmitool Update: Wed Dec 28 13:33:03 2011 Importance: security ID: MDVSA-2011:196 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2011:196 %pre A vulnerability has been discovered and corrected in ipmitool: ipmievd as used in the ipmitool package uses 0666 permissions for its ipmievd.pid PID file, which allows local users to kill arbitrary processes by writing to this file (CVE-2011-4339). In Mandriva the ipmievd daemon from the ipmitool package does not have an initscript to start and stop the service, however one could rather easily craft an initscript or start the service by other means rendering the system vulnerable to this issue. The updated packages have been patched to correct this issue. %description IPMI stands for Intelligent Platform Management Interface and is an open standard for machine health, and (remote) control and is implemented by many hardware vendors - Intel is one of the originators, and early adopters of the standard. This package contains a utility for interfacing with IPMI-enabled devices through either the OpenIPMI kernel driver or with IPMI-over-LAN protocol. These functions include printing FRU(Field Replaceable Unit) information, LAN configuration, sensor readings, and remote chassis power control. %package kdebase4-workspace kdebase4-workspace-devel kdebase4-workspace-googlegadgets kdm kinfocenter lib64kdecorations4 lib64kephal4 lib64kfontinst4 lib64kfontinstui4 lib64khotkeysprivate4 lib64kscreensaver5 lib64ksgrd4 lib64ksignalplotter4 lib64kwineffects1 lib64kwinnvidiahack4 lib64kworkspace4 lib64lsofui4 lib64oxygenstyle4 lib64plasma_applet_system_monitor4 lib64plasmaclock4 lib64plasmagenericshell4 lib64plasma-geolocation-interface4 lib64powerdevilcore0 lib64processcore4 lib64processui4 lib64solidcontrol4 lib64solidcontrolifaces4 lib64systemsettingsview2 lib64taskmanager4 lib64weather_ion6 plasma-applet-battery plasma-applet-calendar plasma-applet-quicklaunch plasma-applet-system-monitor-cpu plasma-applet-system-monitor-hdd plasma-applet-system-monitor-hwinfo plasma-applet-system-monitor-net plasma-applet-system-monitor-temperature plasma-applet-webbrowser plasma-krunner-powerdevil plasma-runner-places plasma-scriptengine-python plasma-scriptengine-ruby Update: Thu Dec 29 10:35:10 2011 Importance: bugfix ID: MDVA-2011:097 URL: http://www.mandriva.com/security/advisories?name=MDVA-2011:097 %pre In Mandriva 2011 the startkde script was outdated (based on KDE 4.4.3). It did not run krandr, so display settings were not restored when restarting KDE Desktop (#64927). %description This package contains the KDE 4 application workspace components. %package lib64php5_common5 php-bcmath php-bz2 php-calendar php-cgi php-cli php-ctype php-curl php-dba php-devel php-doc php-dom php-enchant php-exif php-fileinfo php-filter php-fpm php-ftp php-gd php-gettext php-gmp php-hash php-iconv php-imap php-ini php-intl php-json php-ldap php-mbstring php-mcrypt php-mssql php-mysql php-mysqli php-odbc php-openssl php-pcntl php-pdo php-pdo_dblib php-pdo_mysql php-pdo_odbc php-pdo_pgsql php-pdo_sqlite php-pgsql php-phar php-posix php-pspell php-readline php-recode php-session php-shmop php-snmp php-soap php-sockets php-sqlite3 php-sqlite php-sybase_ct php-sysvmsg php-sysvsem php-sysvshm php-tidy php-tokenizer php-wddx php-xml php-xmlreader php-xmlrpc php-xmlwriter php-xsl php-zip php-zlib Update: Fri Dec 30 13:29:02 2011 Importance: security ID: MDVSA-2011:197 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2011:197 %pre Multiple vulnerabilities has been discovered and corrected in php: Integer overflow in the exif_process_IFD_TAG function in exif.c in the exif extension in PHP 5.4.0beta2 on 32-bit platforms allows remote attackers to read the contents of arbitrary memory locations or cause a denial of service via a crafted offset_val value in an EXIF header in a JPEG file, a different vulnerability than CVE-2011-0708 (CVE-2011-4566). PHP before 5.3.9 computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote attackers to cause a denial of service (CPU consumption) by sending many crafted parameters (CVE-2011-4885). The updated packages have been patched to correct this issue. %description PHP5 is an HTML-embeddable scripting language. PHP5 offers built-in database integration for several commercial and non-commercial database management systems, so writing a database-enabled script with PHP5 is fairly simple. The most common use of PHP5 coding is probably as a replacement for CGI scripts. This version of php has the suhosin patch 0.9.10 applied. Please report bugs here: http://qa.mandriva.com/ so that the official maintainer of this Mandriva package can help you. More information regarding the suhosin patch 0.9.10 here: http://www.suhosin.org/ %package man-pages-ru Update: Sat Dec 31 14:13:59 2011 Importance: bugfix ID: MDVA-2011:098 URL: http://www.mandriva.com/security/advisories?name=MDVA-2011:098 %pre The man-pages-ru package provides the man1/dosemu* man file that conflicts with the one provided by the dosemu package, this update solves the file conflict (#65038). %description A large collection of man pages (reference material) from the Linux Documentation Project (LDP), translated to Russian. %package perl-FCGI Update: Mon Jan 02 11:34:15 2012 Importance: security ID: MDVSA-2012:001 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:001 %pre A vulnerability has been found and corrected in fcgi: The FCGI (aka Fast CGI) module 0.70 through 0.73 for Perl, as used by CGI::Fast, uses environment variable values from one request during processing of a later request, which allows remote attackers to bypass authentication via crafted HTTP headers (CVE-2011-2766). The updated packages have been patched to correct this issue. %description This is a Fast CGI module for perl. It's based on the FCGI module that comes with Open Market's FastCGI Developer's Kit, but does not require you to recompile perl. See for more information about fastcgi. Lincoln D. Stein's perl CGI module also contains some information about fastcgi programming. %package lib64t1lib5 lib64t1lib-devel lib64t1lib-static-devel t1lib-config t1lib-progs Update: Mon Jan 02 16:54:24 2012 Importance: security ID: MDVSA-2012:002 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:002 %pre A vulnerability has been found and corrected in t1lib: t1lib 5.1.2 and earlier uses an invalid pointer in conjunction with a dereference operation, which allows remote attackers to execute arbitrary code via a specially crafted Type 1 font in a PDF document (CVE-2011-0764). The updated packages have been patched to correct this issue. %description T1lib is a library for generating character and string-glyphs from Adobe Type 1 fonts under UNIX. T1lib uses most of the code of the X11 rasterizer donated by IBM to the X11-project. But some disadvantages of the rasterizer being included in X11 have been eliminated. T1lib also includes a support for antialiasing. %package apache-base apache-devel apache-htcacheclean apache-mod_authn_dbd apache-mod_cache apache-mod_dav apache-mod_dbd apache-mod_deflate apache-mod_disk_cache apache-mod_file_cache apache-mod_ldap apache-mod_mem_cache apache-mod_proxy apache-mod_proxy_ajp apache-mod_proxy_scgi apache-mod_reqtimeout apache-mod_ssl apache-modules apache-mod_userdir apache-mpm-event apache-mpm-itk apache-mpm-peruser apache-mpm-prefork apache-mpm-worker apache-source Update: Tue Jan 10 12:38:48 2012 Importance: security ID: MDVSA-2012:003 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:003 %pre Multiple vulnerabilities has been found and corrected in apache: Integer overflow in the ap_pregsub function in server/util.c in the Apache HTTP Server 2.0.x through 2.0.64 and 2.2.x through 2.2.21, when the mod_setenvif module is enabled, allows local users to gain privileges via a .htaccess file with a crafted SetEnvIf directive, in conjunction with a crafted HTTP request header, leading to a heap-based buffer overflow (CVE-2011-3607). The mod_proxy module in the Apache HTTP Server 1.3.x through 1.3.42, 2.0.x through 2.0.64, and 2.2.x through 2.2.21, when the Revision 1179239 patch is in place, does not properly interact with use of (1) RewriteRule and (2) ProxyPassMatch pattern matches for configuration of a reverse proxy, which allows remote attackers to send requests to intranet servers via a malformed URI containing an \@ (at sign) character and a : (colon) character in invalid positions. NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-3368 (CVE-2011-4317). The updated packages have been patched to correct these issues. %description This package contains the main binary of apache, a powerful, full-featured, efficient and freely-available Web server. Apache is also the most popular Web server on the Internet. This version of apache is fully modular, and many modules are available in pre-compiled formats, like PHP and mod_auth_external. This package defaults to a maximum of 128 dynamically loadable modules. This package defaults to a ServerLimit of 1024. You can change these values at RPM build time by using for example: --define 'maxmodules 512' --define 'serverlimit 2048' The package was built to support a maximum of 128 dynamically loadable modules. The package was built with a ServerLimit of 1024. %package lib64rpm5.3 lib64rpm-devel lib64rpm-static-devel perl-RPM python-rpm rpm rpm-apidocs rpm-build Update: Wed Jan 11 12:56:53 2012 Importance: bugfix ID: MDVA-2012:001 URL: http://www.mandriva.com/security/advisories?name=MDVA-2012:001 %pre A bug in librpmconstant caused strings from being converted to upper case with some certain locale types (such as i.e. Turkish) and using softwares such as urpmi and rpmdrake (#65067). The updated package have been patched to correct this issue. %description RPM is a powerful command line driven package management system capable of installing, uninstalling, verifying, querying, and updating software packages. Each software package consists of an archive of files along with information about the package like its version, a description, etc. %package lib64blkid1 lib64blkid-devel lib64mount1 lib64mount-devel lib64uuid1 lib64uuid-devel util-linux uuidd Update: Wed Jan 11 18:12:37 2012 Importance: bugfix ID: MDVA-2012:002 URL: http://www.mandriva.com/security/advisories?name=MDVA-2012:002 %pre This is a bugfix release that adds a personality flag to the setarch utility (--uname-2.6) that will make it possible to have uname -r report a kernel version of 2.6 even though you might be running the linux kernel 3.x. The updated package have been patched to correct this issue. %description The util-linux-ng package contains a large variety of low-level system utilities that are necessary for a Linux system to function. Among others, Util-linux-ng contains the fdisk configuration tool and the login program. %package fglrx-kernel-2.6.39.4-5.1-desktop fglrx-kernel-2.6.39.4-5.1-server fglrx-kernel-desktop-latest fglrx-kernel-server-latest kernel-desktop kernel-desktop-debuginfo kernel-desktop-devel kernel-server kernel-server-debuginfo kernel-server-devel kernel-source nvidia173-kernel-2.6.39.4-5.1-desktop nvidia173-kernel-2.6.39.4-5.1-server nvidia173-kernel-desktop-latest nvidia173-kernel-server-latest nvidia96xx-kernel-2.6.39.4-5.1-desktop nvidia96xx-kernel-2.6.39.4-5.1-server nvidia96xx-kernel-desktop-latest nvidia96xx-kernel-server-latest nvidia-current-kernel-2.6.39.4-5.1-desktop nvidia-current-kernel-2.6.39.4-5.1-server nvidia-current-kernel-desktop-latest nvidia-current-kernel-server-latest vboxadditions-kernel-2.6.39.4-5.1-desktop vboxadditions-kernel-2.6.39.4-5.1-server vpnclient-kernel-2.6.39.4-5.1-desktop vpnclient-kernel-2.6.39.4-5.1-server vpnclient-kernel-desktop-latest vpnclient-kernel-server-latest Update: Wed Jan 11 21:36:15 2012 Importance: bugfix ID: MDVA-2012:003 URL: http://www.mandriva.com/security/advisories?name=MDVA-2012:003 %pre This update contains a couple of fixes, most notably it fixes a race in the memory management code during page migration. Also an incorrect value was returned by the IFWLOG netfilter. The Transparent Huge Page has also been disabled by default since it's known to cause very long latency (firefox can stall during several minutes) during heavy IOs on storage devices. The kernel packaging now has been changed to avoid kernel source codeduplication. The source code is only contained in the kernel-source package. The devel package includes some missing files used by external modules. This wasn't detected previously since the dkms system were generating them (wrongly) but now the dkms system has been changed to not modify the kernel source workspace. %description %package fglrx-kernel-2.6.39.4-5.1-desktop fglrx-kernel-2.6.39.4-5.1-server fglrx-kernel-desktop-latest fglrx-kernel-server-latest kernel-desktop kernel-desktop-debuginfo kernel-desktop-devel kernel-server kernel-server-debuginfo kernel-server-devel kernel-source nvidia173-kernel-2.6.39.4-5.1-desktop nvidia173-kernel-2.6.39.4-5.1-server nvidia173-kernel-desktop-latest nvidia173-kernel-server-latest nvidia96xx-kernel-2.6.39.4-5.1-desktop nvidia96xx-kernel-2.6.39.4-5.1-server nvidia96xx-kernel-desktop-latest nvidia96xx-kernel-server-latest nvidia-current-kernel-2.6.39.4-5.1-desktop nvidia-current-kernel-2.6.39.4-5.1-server nvidia-current-kernel-desktop-latest nvidia-current-kernel-server-latest vboxadditions-kernel-2.6.39.4-5.1-desktop vboxadditions-kernel-2.6.39.4-5.1-server vpnclient-kernel-2.6.39.4-5.1-desktop vpnclient-kernel-2.6.39.4-5.1-server vpnclient-kernel-desktop-latest vpnclient-kernel-server-latest Update: Wed Jan 11 21:36:46 2012 Importance: bugfix ID: MDVA-2012:003 URL: http://www.mandriva.com/security/advisories?name=MDVA-2012:003 %pre This update contains a couple of fixes, most notably it fixes a race in the memory management code during page migration. Also an incorrect value was returned by the IFWLOG netfilter. The Transparent Huge Page has also been disabled by default since it's known to cause very long latency (firefox can stall during several minutes) during heavy IOs on storage devices. The kernel packaging now has been changed to avoid kernel source codeduplication. The source code is only contained in the kernel-source package. The devel package includes some missing files used by external modules. This wasn't detected previously since the dkms system were generating them (wrongly) but now the dkms system has been changed to not modify the kernel source workspace. %description %package lib64t1lib5 lib64t1lib-devel lib64t1lib-static-devel t1lib-config t1lib-progs Update: Thu Jan 12 14:56:41 2012 Importance: security ID: MDVSA-2012:004 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:004 %pre Multiple vulnerabilities has been found and corrected in t1lib: A heap-based buffer overflow flaw was found in the way AFM font file parser, used for rendering of DVI files, in GNOME evince document viewer and other products, processed line tokens from the given input stream. A remote attacker could provide a DVI file, with embedded specially-crafted font file, and trick the local user to open it with an application using the AFM font parser, leading to that particular application crash or, potentially, arbitrary code execution with the privileges of the user running the application. Different vulnerability than CVE-2010-2642 (CVE-2011-0433). t1lib 5.1.2 and earlier reads from invalid memory locations, which allows remote attackers to cause a denial of service (application crash) via a crafted Type 1 font in a PDF document, a different vulnerability than CVE-2011-0764 (CVE-2011-1552). Use-after-free vulnerability in t1lib 5.1.2 and earlier allows remote attackers to cause a denial of service (application crash) via a PDF document containing a crafted Type 1 font that triggers an invalid memory write, a different vulnerability than CVE-2011-0764 (CVE-2011-1553). Off-by-one error in t1lib 5.1.2 and earlier allows remote attackers to cause a denial of service (application crash) via a PDF document containing a crafted Type 1 font that triggers an invalid memory read, integer overflow, and invalid pointer dereference, a different vulnerability than CVE-2011-0764 (CVE-2011-1554). The updated packages have been patched to correct these issues. %description T1lib is a library for generating character and string-glyphs from Adobe Type 1 fonts under UNIX. T1lib uses most of the code of the X11 rasterizer donated by IBM to the X11-project. But some disadvantages of the rasterizer being included in X11 have been eliminated. T1lib also includes a support for antialiasing. %package apache-mod_php lib64mbfl1 lib64mbfl-devel lib64php5_common5 php-apc php-apc-admin php-bcmath php-bz2 php-calendar php-cgi php-cli php-ctype php-curl php-dba php-devel php-doc php-dom php-eaccelerator php-eaccelerator-admin php-enchant php-exif php-fileinfo php-filter php-fpm php-ftp php-gd php-gettext php-gmp php-hash php-iconv php-imap php-ini php-intl php-json php-ldap php-mailparse php-mbstring php-mcal php-mcrypt php-mssql php-mysql php-mysqli php-mysqlnd php-odbc php-openssl php-optimizer php-pcntl php-pdo php-pdo_dblib php-pdo_mysql php-pdo_odbc php-pdo_pgsql php-pdo_sqlite php-pgsql php-phar php-posix php-pspell php-readline php-recode php-sasl php-session php-shmop php-snmp php-soap php-sockets php-sqlite3 php-sqlite php-ssh2 php-suhosin php-sybase_ct php-sysvmsg php-sysvsem php-sysvshm php-tclink php-tidy php-timezonedb php-tokenizer php-translit php-vld php-wddx php-xattr php-xdebug php-xml php-xmlreader php-xmlrpc php-xmlwriter php-xsl php-zip php-zlib Update: Sun Jan 15 15:22:06 2012 Importance: bugfix ID: MDVA-2012:004 URL: http://www.mandriva.com/security/advisories?name=MDVA-2012:004 %pre This is a maintenance and bugfix release that upgrades php to the latest 5.3.9 version which resolves numerous upstream bugs in php. php-mysqlnd packages are now also being provided with this advisory. The libmbfl packages has been upgraded to reflect the changes as of php-5.3.9. The php-ssh2 packages has been upgraded to the latest 0.11.3 version. The php-apc extension has been complemented with an additional flavour (apc-mmap+mutex.so) that resolves #64711. Note: in Mandriva you can easily switch between different flavours of APC, please have a look at the topmost lines in the /etc/php.d/99_apc.ini file. %description PHP5 is an HTML-embeddable scripting language. PHP5 offers built-in database integration for several commercial and non-commercial database management systems, so writing a database-enabled script with PHP5 is fairly simple. The most common use of PHP5 coding is probably as a replacement for CGI scripts. This version of php has the suhosin patch 0.9.10 applied. Please report bugs here: http://qa.mandriva.com/ so that the official maintainer of this Mandriva package can help you. More information regarding the suhosin patch 0.9.10 here: http://www.suhosin.org/ %package lib64xml2_2 lib64xml2-devel libxml2-python libxml2-utils Update: Mon Jan 16 15:42:08 2012 Importance: security ID: MDVSA-2012:005 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:005 %pre A vulnerability has been found and corrected in libxml2: A heap-based buffer overflow in libxml2 allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors (CVE-2011-3919). The updated packages have been patched to correct this issue. %description This library allows you to manipulate XML files. It includes support for reading, modifying and writing XML and HTML files. There is DTDs support: this includes parsing and validation even with complex DtDs, either at parse time or later once the document has been modified. The output can be a simple SAX stream or and in-memory DOM-like representations. In this case one can use the built-in XPath and XPointer implementation to select subnodes or ranges. A flexible Input/Output mechanism is available, with existing HTTP and FTP modules and combined to a URI library. %package lib64openssl1.0.0 lib64openssl-devel lib64openssl-engines1.0.0 lib64openssl-static-devel openssl Update: Mon Jan 16 18:04:01 2012 Importance: security ID: MDVSA-2012:007 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:007 %pre Multiple vulnerabilities has been found and corrected in openssl: The DTLS implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f performs a MAC check only if certain padding is valid, which makes it easier for remote attackers to recover plaintext via a padding oracle attack (CVE-2011-4108). Double free vulnerability in OpenSSL 0.9.8 before 0.9.8s, when X509_V_FLAG_POLICY_CHECK is enabled, allows remote attackers to have an unspecified impact by triggering failure of a policy check (CVE-2011-4109). The SSL 3.0 implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f does not properly initialize data structures for block cipher padding, which might allow remote attackers to obtain sensitive information by decrypting the padding data sent by an SSL peer (CVE-2011-4576). The Server Gated Cryptography (SGC) implementation in OpenSSL before 0.9.8s and 1.x before 1.0.0f does not properly handle handshake restarts, which allows remote attackers to cause a denial of service via unspecified vectors (CVE-2011-4619). The GOST ENGINE in OpenSSL before 1.0.0f does not properly handle invalid parameters for the GOST block cipher, which allows remote attackers to cause a denial of service (daemon crash) via crafted data from a TLS client (CVE-2012-0027). The updated packages have been patched to correct these issues. %description The openssl certificate management tool and the shared libraries that provide various encryption and decription algorithms and protocols, including DES, RC4, RSA and SSL. %package perl perl-base perl-devel perl-doc Update: Wed Jan 18 13:13:59 2012 Importance: security ID: MDVSA-2012:008 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:008 %pre Multiple vulnerabilities has been found and corrected in perl: Off-by-one error in the decode_xs function in Unicode/Unicode.xs in the Encode module before 2.44, as used in Perl before 5.15.6, might allow context-dependent attackers to cause a denial of service (memory corruption) via a crafted Unicode string, which triggers a heap-based buffer overflow (CVE-2011-2939). Eval injection in the Digest module before 1.17 for Perl allows context-dependent attackers to execute arbitrary commands via the new constructor (CVE-2011-3597). The updated packages have been patched to correct these issues. %description Perl is a high-level programming language with roots in C, sed, awk and shell scripting. Perl is good at handling processes and files, and is especially good at handling text. Perl's hallmarks are practicality and efficiency. While it is used to do a lot of different things, Perl's most common applications (and what it excels at) are probably system administration utilities and web programming. A large proportion of the CGI scripts on the web are written in Perl. You need the perl package installed on your system so that your system can handle Perl scripts. You need perl-base to have a full perl. %package lib64openssl1.0.0 lib64openssl-devel lib64openssl-engines1.0.0 lib64openssl-static-devel openssl Update: Sun Jan 29 17:08:14 2012 Importance: security ID: MDVSA-2012:011 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:011 %pre A vulnerability has been found and corrected in openssl: OpenSSL 0.9.8s and 1.0.0f does not properly support DTLS applications, which allows remote attackers to cause a denial of service via unspecified vectors. NOTE: this vulnerability exists because of an incorrect fix for CVE-2011-4108 (CVE-2012-0050). The updated packages have been patched to correct this issue. The openssl0.9.8 packages for 2010.2 have been upgraded to the 0.9.8t version which is not vulnerable to this issue. %description The openssl certificate management tool and the shared libraries that provide various encryption and decription algorithms and protocols, including DES, RC4, RSA and SSL. %package apache-base apache-conf apache-devel apache-doc apache-htcacheclean apache-mod_authn_dbd apache-mod_cache apache-mod_dav apache-mod_dbd apache-mod_deflate apache-mod_disk_cache apache-mod_file_cache apache-mod_ldap apache-mod_mem_cache apache-mod_proxy apache-mod_proxy_ajp apache-mod_proxy_scgi apache-mod_reqtimeout apache-mod_ssl apache-mod_suexec apache-modules apache-mod_userdir apache-mpm-event apache-mpm-itk apache-mpm-peruser apache-mpm-prefork apache-mpm-worker apache-source apr-util-dbd-freetds apr-util-dbd-ldap apr-util-dbd-mysql apr-util-dbd-odbc apr-util-dbd-pgsql apr-util-dbd-sqlite3 apr-util-dbm-db apr-util-nss apr-util-openssl lib64apr-util1 lib64apr-util-devel Update: Thu Feb 02 13:31:08 2012 Importance: security ID: MDVSA-2012:012 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:012 %pre Multiple vulnerabilities has been found and corrected in apache (ASF HTTPD): The log_cookie function in mod_log_config.c in the mod_log_config module in the Apache HTTP Server 2.2.17 through 2.2.21, when a threaded MPM is used, does not properly handle a \%{}C format string, which allows remote attackers to cause a denial of service (daemon crash) via a cookie that lacks both a name and a value (CVE-2012-0021). scoreboard.c in the Apache HTTP Server 2.2.21 and earlier might allow local users to cause a denial of service (daemon crash during shutdown) or possibly have unspecified other impact by modifying a certain type field within a scoreboard shared memory segment, leading to an invalid call to the free function (CVE-2012-0031). protocol.c in the Apache HTTP Server 2.2.x through 2.2.21 does not properly restrict header information during construction of Bad Request (aka 400) error documents, which allows remote attackers to obtain the values of HTTPOnly cookies via vectors involving a (1) long or (2) malformed header in conjunction with crafted web script (CVE-2012-0053). The updated packages have been upgraded to the latest 2.2.22 version which is not vulnerable to this issue. Additionally APR and APR-UTIL has been upgraded to the latest versions 1.4.5 and 1.4.1 respectively which holds many improvments over the previous versions. %description The mission of the Apache Portable Runtime (APR) is to provide a free library of C data structures and routines. This library contains additional utility interfaces for APR; including support for XML, LDAP, database interfaces, URI parsing and more. %package firefox firefox-af firefox-ar firefox-ast firefox-be firefox-bg firefox-bn firefox-br firefox-bs firefox-ca firefox-cs firefox-cy firefox-da firefox-de firefox-devel firefox-el firefox-en_GB firefox-eo firefox-es_AR firefox-es_ES firefox-et firefox-eu firefox-fa firefox-fi firefox-fr firefox-fy firefox-ga_IE firefox-gd firefox-gl firefox-gu_IN firefox-he firefox-hi firefox-hr firefox-hu firefox-hy firefox-id firefox-is firefox-it firefox-ja firefox-kk firefox-kn firefox-ko firefox-ku firefox-lg firefox-lt firefox-lv firefox-mai firefox-mk firefox-ml firefox-mr firefox-nb_NO firefox-nl firefox-nn_NO firefox-nso firefox-or firefox-pa_IN firefox-pl firefox-pt_BR firefox-pt_PT firefox-ro firefox-ru firefox-si firefox-sk firefox-sl firefox-sq firefox-sr firefox-sv_SE firefox-ta firefox-te firefox-th firefox-tr firefox-uk firefox-vi firefox-zh_CN firefox-zh_TW firefox-zu lib64vpx0 lib64vpx-devel libvpx-utils mozilla-thunderbird mozilla-thunderbird-ar mozilla-thunderbird-ca mozilla-thunderbird-cs mozilla-thunderbird-da mozilla-thunderbird-de mozilla-thunderbird-en_GB mozilla-thunderbird-enigmail mozilla-thunderbird-enigmail-ar mozilla-thunderbird-enigmail-ca mozilla-thunderbird-enigmail-cs mozilla-thunderbird-enigmail-de mozilla-thunderbird-enigmail-el mozilla-thunderbird-enigmail-es mozilla-thunderbird-enigmail-fi mozilla-thunderbird-enigmail-fr mozilla-thunderbird-enigmail-it mozilla-thunderbird-enigmail-ja mozilla-thunderbird-enigmail-ko mozilla-thunderbird-enigmail-nb mozilla-thunderbird-enigmail-nl mozilla-thunderbird-enigmail-pl mozilla-thunderbird-enigmail-pt mozilla-thunderbird-enigmail-pt_BR mozilla-thunderbird-enigmail-ru mozilla-thunderbird-enigmail-sl mozilla-thunderbird-enigmail-sv mozilla-thunderbird-enigmail-tr mozilla-thunderbird-enigmail-vi mozilla-thunderbird-enigmail-zh_CN mozilla-thunderbird-enigmail-zh_TW mozilla-thunderbird-es_AR mozilla-thunderbird-es_ES mozilla-thunderbird-et mozilla-thunderbird-eu mozilla-thunderbird-fi mozilla-thunderbird-fr mozilla-thunderbird-fy mozilla-thunderbird-ga mozilla-thunderbird-gd mozilla-thunderbird-gl mozilla-thunderbird-he mozilla-thunderbird-hu mozilla-thunderbird-is mozilla-thunderbird-it mozilla-thunderbird-ja mozilla-thunderbird-ko mozilla-thunderbird-lightning mozilla-thunderbird-lt mozilla-thunderbird-nb_NO mozilla-thunderbird-nl mozilla-thunderbird-nn_NO mozilla-thunderbird-pl mozilla-thunderbird-pt_BR mozilla-thunderbird-pt_PT mozilla-thunderbird-ru mozilla-thunderbird-si mozilla-thunderbird-sk mozilla-thunderbird-sl mozilla-thunderbird-sq mozilla-thunderbird-sv_SE mozilla-thunderbird-tr mozilla-thunderbird-uk mozilla-thunderbird-zh_TW nsinstall Update: Fri Feb 03 14:33:04 2012 Importance: security ID: MDVSA-2012:013 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:013 %pre Security issues were identified and fixed in mozilla firefox and thunderbird: Use-after-free vulnerability in Mozilla Firefox before 3.6.26 and 4.x through 9.0, Thunderbird before 3.1.18 and 5.0 through 9.0, and SeaMonkey before 2.7 might allow remote attackers to execute arbitrary code via vectors related to incorrect AttributeChildRemoved notifications that affect access to removed nsDOMAttribute child nodes (CVE-2011-3659). Mozilla Firefox before 3.6.26 and 4.x through 6.0, Thunderbird before 3.1.18 and 5.0 through 6.0, and SeaMonkey before 2.4 do not properly enforce the IPv6 literal address syntax, which allows remote attackers to obtain sensitive information by making XMLHttpRequest calls through a proxy and reading the error messages (CVE-2011-3670). Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 3.6.26 and 4.x through 9.0, Thunderbird before 3.1.18 and 5.0 through 9.0, and SeaMonkey before 2.7 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors (CVE-2012-0442). Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 4.x through 9.0, Thunderbird 5.0 through 9.0, and SeaMonkey before 2.7 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors (CVE-2012-0443). Mozilla Firefox before 3.6.26 and 4.x through 9.0, Thunderbird before 3.1.18 and 5.0 through 9.0, and SeaMonkey before 2.7 do not properly initialize nsChildView data structures, which allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via a crafted Ogg Vorbis file (CVE-2012-0444). Mozilla Firefox 4.x through 9.0, Thunderbird 5.0 through 9.0, and SeaMonkey before 2.7 allow remote attackers to bypass the HTML5 frame-navigation policy and replace arbitrary sub-frames by creating a form submission target with a sub-frame's name attribute (CVE-2012-0445). Multiple cross-site scripting (XSS) vulnerabilities in Mozilla Firefox 4.x through 9.0, Thunderbird 5.0 through 9.0, and SeaMonkey before 2.7 allow remote attackers to inject arbitrary web script or HTML via a (1) web page or (2) Firefox extension, related to improper enforcement of XPConnect security restrictions for frame scripts that call untrusted objects (CVE-2012-0446). Mozilla Firefox 4.x through 9.0, Thunderbird 5.0 through 9.0, and SeaMonkey before 2.7 do not properly initialize data for image/vnd.microsoft.icon images, which allows remote attackers to obtain potentially sensitive information by reading a PNG image that was created through conversion from an ICO image (CVE-2012-0447). Mozilla Firefox before 3.6.26 and 4.x through 9.0, Thunderbird before 3.1.18 and 5.0 through 9.0, and SeaMonkey before 2.7 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via a malformed XSLT stylesheet that is embedded in a document (CVE-2012-0449). Mozilla Firefox 4.x through 9.0 and SeaMonkey before 2.7 on Linux and Mac OS X set weak permissions for Firefox Recovery Key.html, which might allow local users to read a Firefox Sync key via standard filesystem operations (CVE-2012-0450). Additionally the libvpx packages has been upgraded to the 0.9.7 version for Mandriva Linux 2011 which is required by firefox 10.0. %description Mozilla Thunderbird is a full-featured email, RSS and newsgroup client that makes emailing safer, faster and easier than ever before. %package firefox firefox-af firefox-ar firefox-ast firefox-be firefox-bg firefox-bn_BD firefox-bn_IN firefox-br firefox-bs firefox-ca firefox-cs firefox-cy firefox-da firefox-de firefox-devel firefox-el firefox-en_GB firefox-en_ZA firefox-eo firefox-es_AR firefox-es_CL firefox-es_ES firefox-es_MX firefox-et firefox-eu firefox-fa firefox-fi firefox-fr firefox-fy firefox-ga_IE firefox-gd firefox-gl firefox-gu_IN firefox-he firefox-hi firefox-hr firefox-hu firefox-hy firefox-id firefox-is firefox-it firefox-ja firefox-kk firefox-kn firefox-ko firefox-ku firefox-lg firefox-lt firefox-lv firefox-mai firefox-mk firefox-ml firefox-mr firefox-nb_NO firefox-nl firefox-nn_NO firefox-nso firefox-or firefox-pa_IN firefox-pl firefox-pt_BR firefox-pt_PT firefox-ro firefox-ru firefox-si firefox-sk firefox-sl firefox-sq firefox-sr firefox-sv_SE firefox-ta firefox-ta_LK firefox-te firefox-th firefox-tr firefox-uk firefox-vi firefox-zh_CN firefox-zh_TW firefox-zu Update: Sun Feb 05 15:41:43 2012 Importance: bugfix ID: MDVA-2012:007 URL: http://www.mandriva.com/security/advisories?name=MDVA-2012:007 %pre This is a maintenance and bugfix release for firefox 10.0 which utilizes better compilation optimizarions. Additionally a few more language packs has been added. %description Localizations for Firefox web browser. %package ldetect-lst ldetect-lst-devel Update: Mon Feb 06 17:05:01 2012 Importance: bugfix ID: MDVA-2012:008 URL: http://www.mandriva.com/security/advisories?name=MDVA-2012:008 %pre In previous version of ldetect-lst video driver nvidia-96xx was disabled as incompatible with X.org 1.10. It was fixed in latest version of this driver (see https://qa.mandriva.com/show_bug.cgi?id=64750), so it is turned on again. %description The hardware device lists provided by this package are used as lookup table to get hardware autodetection. %package gnome-power-manager Update: Mon Feb 06 17:23:50 2012 Importance: bugfix ID: MDVA-2012:009 URL: http://www.mandriva.com/security/advisories?name=MDVA-2012:009 %pre Fixed bug with phantom battery after resume. %description GNOME Power Manager uses the information and facilities provided by Upower displaying icons and handling user callbacks in an interactive GNOME session. GNOME Power Preferences allows authorised users to set policy and change preferences. %package lib64msn0.3 libmsn-devel libmsn-test Update: Mon Feb 06 18:51:46 2012 Importance: bugfix ID: MDVA-2012:010 URL: http://www.mandriva.com/security/advisories?name=MDVA-2012:010 %pre The include xmlParser.h is missing in default libmsn-devel installation, this causes trouble wen building other kde packages. This update adds this missing include. %description Libmsn is a reusable, open-source, fully documented library for connecting to Microsoft's MSN Messenger service. %package lib64qt3support4 lib64qt4-devel lib64qtclucene4 lib64qtcore4 lib64qtdbus4 lib64qtdeclarative4 lib64qtdesigner4 lib64qtgui4 lib64qthelp4 lib64qtmultimedia4 lib64qtnetwork4 lib64qtopengl4 lib64qtscript4 lib64qtscripttools4 lib64qtsql4 lib64qtsvg4 lib64qttest4 lib64qtwebkit4 lib64qtxml4 lib64qtxmlpatterns4 qt4-accessibility-plugin qt4-assistant qt4-common qt4-database-plugin-mysql qt4-database-plugin-pgsql qt4-database-plugin-sqlite qt4-database-plugin-tds qt4-demos qt4-designer qt4-designer-plugin-qt3support qt4-designer-plugin-webkit qt4-devel-private qt4-doc qt4-examples qt4-graphicssystems-plugin qt4-linguist qt4-qdoc3 qt4-qmlviewer qt4-qtconfig qt4-qtdbus qt4-qvfb qt4-xmlpatterns Update: Mon Feb 06 18:59:12 2012 Importance: bugfix ID: MDVA-2012:011 URL: http://www.mandriva.com/security/advisories?name=MDVA-2012:011 %pre The current Mandriva 2011 Qt4 4.7.4 packages don't package qt4 private-headers needed for qt-creator update. This update adds this missing package so other updates that requires it can be done in future. %description Qt is a GUI software toolkit which simplifies the task of writing and maintaining GUI (Graphical User Interface) applications for the X Window System. Qt is written in C++ and is fully object-oriented. This package contains the shared library needed to run Qt applications, as well as the README files for Qt. %package gwenview kamera kcolorchooser kdegraphics4 kdegraphics4-core kdegraphics4-devel kgamma kipi-common kolourpaint kruler ksnapshot lib64gwenviewlib4 lib64kdcraw9 lib64kexiv2_9 lib64kipi8 lib64kolourpaint_lgpl4 lib64ksane0 lib64okularcore1 libkdcraw-common okular Update: Mon Feb 06 19:52:34 2012 Importance: bugfix ID: MDVA-2012:012 URL: http://www.mandriva.com/security/advisories?name=MDVA-2012:012 %pre Okular currently has two menu entries, one on the Graphics section and other in the Office section. This update, removes the okular from the Graphic menu section entry, cleaning up the menu and avoid confusion. %description Graphical tools for the K Desktop Environment. kdegraphics is a collection of graphic oriented applications %package akonadi-kde kdepim4-runtime-devel lib64akonadi_filestore4 lib64akonadi-xml4 lib64kdepim-copy4 lib64kmindexreader4 lib64maildir4 Update: Mon Feb 06 19:59:35 2012 Importance: bugfix ID: MDVA-2012:013 URL: http://www.mandriva.com/security/advisories?name=MDVA-2012:013 %pre This fix remove rarely used akonadi icon from systray. %description Information Management applications for the K Desktop Environment runtime libs. %package dumpcap lib64wireshark1 lib64wireshark-devel rawshark tshark wireshark wireshark-tools Update: Thu Feb 09 11:55:21 2012 Importance: security ID: MDVSA-2012:015 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:015 %pre Multiple file parser and NULL pointer vulnerabilities including a RLC dissector buffer overflow was found and corrected in Wireshark. This advisory provides the latest version of Wireshark (1.6.5 ) which is not vulnerable to these issues. %description Wireshark is a network traffic analyzer for Unix-ish operating systems. It is based on GTK+, a graphical user interface library, and libpcap, a packet capture and filtering library. Wireshark is a fork of Ethereal(tm) %package firefox firefox-devel Update: Thu Feb 09 12:06:22 2012 Importance: bugfix ID: MDVA-2012:014 URL: http://www.mandriva.com/security/advisories?name=MDVA-2012:014 %pre This is a maintenance and bugfix release for firefox 10.0 which utilizes slightlty better compilation optimizarions and fixes a problem with an empty printer list on Mandriva Linux 2011 (#65237). %description Mozilla Firefox is a web browser %package dkms dkms-minimal Update: Thu Feb 09 12:34:43 2012 Importance: bugfix ID: MDVA-2012:015 URL: http://www.mandriva.com/security/advisories?name=MDVA-2012:015 %pre The dkms package was still requiring the kernel-devel-latest package. But since kernel 2.6.39, this latest package is no more used. This new release removes this old requirement and the dkms package simply requires kernel-devel package now. %description This package contains the framework for the Dynamic Kernel Module Support (DKMS) method for installing module RPMS as originally developed by the Dell Computer Corporation. This package is intended for building binary kernel modules with dkms source packages installed %package lib64mysql18 lib64mysqld0 lib64mysql-devel lib64mysqlservices0 lib64mysql-static-devel mysql mysql-bench mysql-client mysql-common mysql-common-core mysql-core Update: Fri Feb 10 15:59:56 2012 Importance: bugfix ID: MDVA-2012:016 URL: http://www.mandriva.com/security/advisories?name=MDVA-2012:016 %pre This is a maintenance and bugfix release that upgrades mysql to the latest 5.5 version which solves numerous upstream bugs. The updated packages have been upgraded to mysql 5.5.20. %description The MySQL(TM) software delivers a very fast, multi-threaded, multi-user, and robust SQL (Structured Query Language) database server. MySQL Server is intended for mission-critical, heavy-load production systems as well as for embedding into mass-deployed software. MySQL is a trademark of MySQL AB. The mysql server is compiled with the following storage engines: - InnoDB Storage Engine - Archive Storage Engine - CSV Storage Engine - Federated Storage Engine - User Defined Functions (UDFs). - Blackhole Storage Engine - Partition Storage Engine - Perfschema Storage Engine %package firefox firefox-devel Update: Fri Feb 10 17:56:14 2012 Importance: bugfix ID: MDVA-2012:017 URL: http://www.mandriva.com/security/advisories?name=MDVA-2012:017 %pre A small regression was introduced with the MDVA-2012:014 advisory. A wrong dependency snucked in that was meant for cooker only. %description Mozilla Firefox is a web browser %package xmlto Update: Sat Feb 11 09:50:14 2012 Importance: bugfix ID: MDVA-2012:018 URL: http://www.mandriva.com/security/advisories?name=MDVA-2012:018 %pre xmlto requires now the document type definition 45. This allows documentation using it and using this definition to build properly. %description This is a package for converting XML files to various formats using XSL stylesheets. %package firefox firefox-af firefox-ar firefox-ast firefox-be firefox-bg firefox-bn_BD firefox-bn_IN firefox-br firefox-bs firefox-ca firefox-cs firefox-cy firefox-da firefox-de firefox-devel firefox-el firefox-en_GB firefox-en_ZA firefox-eo firefox-es_AR firefox-es_CL firefox-es_ES firefox-es_MX firefox-et firefox-eu firefox-fa firefox-fi firefox-fr firefox-fy firefox-ga_IE firefox-gd firefox-gl firefox-gu_IN firefox-he firefox-hi firefox-hr firefox-hu firefox-hy firefox-id firefox-is firefox-it firefox-ja firefox-kk firefox-kn firefox-ko firefox-ku firefox-lg firefox-lt firefox-lv firefox-mai firefox-mk firefox-ml firefox-mr firefox-nb_NO firefox-nl firefox-nn_NO firefox-nso firefox-or firefox-pa_IN firefox-pl firefox-pt_BR firefox-pt_PT firefox-ro firefox-ru firefox-si firefox-sk firefox-sl firefox-sq firefox-sr firefox-sv_SE firefox-ta firefox-ta_LK firefox-te firefox-th firefox-tr firefox-uk firefox-vi firefox-zh_CN firefox-zh_TW firefox-zu Update: Sun Feb 12 18:11:21 2012 Importance: security ID: MDVSA-2012:017 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:017 %pre Use-after-free vulnerability in Mozilla Firefox 10.x before 10.0.1, Thunderbird 10.x before 10.0.1, and SeaMonkey 2.7 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors that trigger failure of an nsXBLDocumentInfo::ReadPrototypeBindings function call, related to the cycle collector's access to a hash table containing a stale XBL binding (CVE-2012-0452). %description Localizations for Firefox web browser. %package mozilla-thunderbird mozilla-thunderbird-ar mozilla-thunderbird-be mozilla-thunderbird-bg mozilla-thunderbird-bn_BD mozilla-thunderbird-br mozilla-thunderbird-ca mozilla-thunderbird-cs mozilla-thunderbird-da mozilla-thunderbird-de mozilla-thunderbird-el mozilla-thunderbird-en_GB mozilla-thunderbird-enigmail mozilla-thunderbird-enigmail-ar mozilla-thunderbird-enigmail-ca mozilla-thunderbird-enigmail-cs mozilla-thunderbird-enigmail-de mozilla-thunderbird-enigmail-el mozilla-thunderbird-enigmail-es mozilla-thunderbird-enigmail-fi mozilla-thunderbird-enigmail-fr mozilla-thunderbird-enigmail-it mozilla-thunderbird-enigmail-ja mozilla-thunderbird-enigmail-ko mozilla-thunderbird-enigmail-nb mozilla-thunderbird-enigmail-nl mozilla-thunderbird-enigmail-pl mozilla-thunderbird-enigmail-pt mozilla-thunderbird-enigmail-pt_BR mozilla-thunderbird-enigmail-ru mozilla-thunderbird-enigmail-sl mozilla-thunderbird-enigmail-sv mozilla-thunderbird-enigmail-tr mozilla-thunderbird-enigmail-vi mozilla-thunderbird-enigmail-zh_CN mozilla-thunderbird-enigmail-zh_TW mozilla-thunderbird-es_AR mozilla-thunderbird-es_ES mozilla-thunderbird-et mozilla-thunderbird-eu mozilla-thunderbird-fi mozilla-thunderbird-fr mozilla-thunderbird-fy mozilla-thunderbird-ga mozilla-thunderbird-gd mozilla-thunderbird-gl mozilla-thunderbird-he mozilla-thunderbird-hu mozilla-thunderbird-id mozilla-thunderbird-is mozilla-thunderbird-it mozilla-thunderbird-ja mozilla-thunderbird-ko mozilla-thunderbird-lightning mozilla-thunderbird-lt mozilla-thunderbird-nb_NO mozilla-thunderbird-nl mozilla-thunderbird-nn_NO mozilla-thunderbird-pl mozilla-thunderbird-pt_BR mozilla-thunderbird-pt_PT mozilla-thunderbird-ro mozilla-thunderbird-ru mozilla-thunderbird-si mozilla-thunderbird-sk mozilla-thunderbird-sl mozilla-thunderbird-sq mozilla-thunderbird-sv_SE mozilla-thunderbird-ta_LK mozilla-thunderbird-tr mozilla-thunderbird-uk mozilla-thunderbird-vi mozilla-thunderbird-zh_CN mozilla-thunderbird-zh_TW nsinstall Update: Mon Feb 13 13:04:51 2012 Importance: security ID: MDVSA-2012:018 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:018 %pre Use-after-free vulnerability in Mozilla Firefox 10.x before 10.0.1, Thunderbird 10.x before 10.0.1, and SeaMonkey 2.7 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via vectors that trigger failure of an nsXBLDocumentInfo::ReadPrototypeBindings function call, related to the cycle collector's access to a hash table containing a stale XBL binding (CVE-2012-0452). %description Mozilla Thunderbird is a full-featured email, RSS and newsgroup client that makes emailing safer, faster and easier than ever before. %package mozilla-thunderbird mozilla-thunderbird-enigmail mozilla-thunderbird-enigmail-ar mozilla-thunderbird-enigmail-ca mozilla-thunderbird-enigmail-cs mozilla-thunderbird-enigmail-de mozilla-thunderbird-enigmail-el mozilla-thunderbird-enigmail-es mozilla-thunderbird-enigmail-fi mozilla-thunderbird-enigmail-fr mozilla-thunderbird-enigmail-it mozilla-thunderbird-enigmail-ja mozilla-thunderbird-enigmail-ko mozilla-thunderbird-enigmail-nb mozilla-thunderbird-enigmail-nl mozilla-thunderbird-enigmail-pl mozilla-thunderbird-enigmail-pt mozilla-thunderbird-enigmail-pt_BR mozilla-thunderbird-enigmail-ru mozilla-thunderbird-enigmail-sl mozilla-thunderbird-enigmail-sv mozilla-thunderbird-enigmail-tr mozilla-thunderbird-enigmail-vi mozilla-thunderbird-enigmail-zh_CN mozilla-thunderbird-enigmail-zh_TW mozilla-thunderbird-lightning nsinstall Update: Mon Feb 13 18:16:00 2012 Importance: bugfix ID: MDVA-2012:019 URL: http://www.mandriva.com/security/advisories?name=MDVA-2012:019 %pre This is a maintenance and bugfix release that provides thunderbird 10.0.1 which utilizes better compilation optimizarions. %description Mozilla Thunderbird is a full-featured email, RSS and newsgroup client that makes emailing safer, faster and easier than ever before. %package lib64apr1 lib64apr-devel Update: Tue Feb 14 11:26:06 2012 Importance: security ID: MDVSA-2012:019 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:019 %pre A vulnerability has been found and corrected in ASF APR: tables/apr_hash.c in the Apache Portable Runtime (APR) library through 1.4.5 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table (CVE-2012-0840). APR has been upgraded to the latest version (1.4.6) which holds many improvments over the previous versions and is not vulnerable to this issue. %description The mission of the Apache Portable Runtime (APR) is to provide a free library of C data structures and routines, forming a system portability layer to as many operating systems as possible, including Unices, MS Win32, BeOS and OS/2. %package java-1.6.0-openjdk java-1.6.0-openjdk-demo java-1.6.0-openjdk-devel java-1.6.0-openjdk-javadoc java-1.6.0-openjdk-src Update: Fri Feb 17 16:29:57 2012 Importance: security ID: MDVSA-2012:021 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:021 %pre Multiple security issues were identified and fixed in OpenJDK (icedtea6): Fix issues in java sound (CVE-2011-3563). Fix in AtomicReferenceArray (CVE-2011-3571). Add property to limit number of request headers to the HTTP Server (CVE-2011-5035). Incorect checking for graphics rendering object (CVE-2012-0497). Multiple unspecified vulnerabilities allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors (CVE-2012-0498. CVE-2012-0499, CVE-2012-0500). Better input parameter checking in zip file processing (CVE-2012-0501). Issues with some KeyboardFocusManager method (CVE-2012-0502). Issues with TimeZone class (CVE-2012-0503). Enhance exception throwing mechanism in ObjectStreamClass (CVE-2012-0505). Issues with some method in corba (CVE-2012-0506). The updated packages provides icedtea6-1.10.6 which is not vulnerable to these issues. %description The OpenJDK runtime environment. %package lib64png3 lib64png-devel lib64png-static-devel libpng-source Update: Wed Feb 22 09:43:55 2012 Importance: security ID: MDVSA-2012:022 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:022 %pre A vulnerability has been found and corrected in libpng: Integer overflow in libpng allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors that trigger an integer truncation (CVE-2011-3026). The updated packages have been patched to correct this issue. %description The libpng package contains a library of functions for creating and manipulating PNG (Portable Network Graphics) image format files. PNG is a bit-mapped graphics format similar to the GIF format. PNG was created to replace the GIF format, since GIF uses a patented data compression algorithm. Libpng should be installed if you need to manipulate PNG format image files. %package lib64xml2_2 lib64xml2-devel libxml2-python libxml2-utils Update: Wed Feb 22 11:03:48 2012 Importance: security ID: MDVSA-2012:023 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:023 %pre A vulnerability has been found and corrected in libxml2: It was found that the hashing routine used by libxml2 arrays was susceptible to predictable hash collisions. Sending a specially-crafted message to an XML service could result in longer processing time, which could lead to a denial of service. To mitigate this issue, randomization has been added to the hashing function to reduce the chance of an attacker successfully causing intentional collisions (CVE-2012-0841). The updated packages have been patched to correct this issue. %description This library allows you to manipulate XML files. It includes support for reading, modifying and writing XML and HTML files. There is DTDs support: this includes parsing and validation even with complex DtDs, either at parse time or later once the document has been modified. The output can be a simple SAX stream or and in-memory DOM-like representations. In this case one can use the built-in XPath and XPointer implementation to select subnodes or ranges. A flexible Input/Output mechanism is available, with existing HTTP and FTP modules and combined to a URI library. %package lib64mysql18 lib64mysqld0 lib64mysql-devel lib64mysqlservices0 lib64mysql-static-devel mysql mysql-bench mysql-client mysql-common mysql-common-core mysql-core Update: Wed Feb 22 12:14:25 2012 Importance: bugfix ID: MDVA-2012:021 URL: http://www.mandriva.com/security/advisories?name=MDVA-2012:021 %pre This is a maintenance and bugfix release that upgrades mysql to the latest 5.5 version which solves numerous upstream bugs. The updated packages have been upgraded to mysql 5.5.21. %description The MySQL(TM) software delivers a very fast, multi-threaded, multi-user, and robust SQL (Structured Query Language) database server. MySQL Server is intended for mission-critical, heavy-load production systems as well as for embedding into mass-deployed software. MySQL is a trademark of MySQL AB. The mysql server is compiled with the following storage engines: - InnoDB Storage Engine - Archive Storage Engine - CSV Storage Engine - Federated Storage Engine - User Defined Functions (UDFs). - Blackhole Storage Engine - Partition Storage Engine - Perfschema Storage Engine %package firefox firefox-af firefox-ar firefox-ast firefox-be firefox-bg firefox-bn_BD firefox-bn_IN firefox-br firefox-bs firefox-ca firefox-cs firefox-cy firefox-da firefox-de firefox-devel firefox-el firefox-en_GB firefox-en_ZA firefox-eo firefox-es_AR firefox-es_CL firefox-es_ES firefox-es_MX firefox-et firefox-eu firefox-fa firefox-fi firefox-fr firefox-fy firefox-ga_IE firefox-gd firefox-gl firefox-gu_IN firefox-he firefox-hi firefox-hr firefox-hu firefox-hy firefox-id firefox-is firefox-it firefox-ja firefox-kk firefox-kn firefox-ko firefox-ku firefox-lg firefox-lt firefox-lv firefox-mai firefox-mk firefox-ml firefox-mr firefox-nb_NO firefox-nl firefox-nn_NO firefox-nso firefox-or firefox-pa_IN firefox-pl firefox-pt_BR firefox-pt_PT firefox-ro firefox-ru firefox-si firefox-sk firefox-sl firefox-sq firefox-sr firefox-sv_SE firefox-ta firefox-ta_LK firefox-te firefox-th firefox-tr firefox-uk firefox-vi firefox-zh_CN firefox-zh_TW firefox-zu lib64nss3 lib64nss-devel lib64nss-static-devel mozilla-thunderbird mozilla-thunderbird-ar mozilla-thunderbird-be mozilla-thunderbird-bg mozilla-thunderbird-bn_BD mozilla-thunderbird-br mozilla-thunderbird-ca mozilla-thunderbird-cs mozilla-thunderbird-da mozilla-thunderbird-de mozilla-thunderbird-el mozilla-thunderbird-en_GB mozilla-thunderbird-enigmail mozilla-thunderbird-enigmail-ar mozilla-thunderbird-enigmail-ca mozilla-thunderbird-enigmail-cs mozilla-thunderbird-enigmail-de mozilla-thunderbird-enigmail-el mozilla-thunderbird-enigmail-es mozilla-thunderbird-enigmail-fi mozilla-thunderbird-enigmail-fr mozilla-thunderbird-enigmail-it mozilla-thunderbird-enigmail-ja mozilla-thunderbird-enigmail-ko mozilla-thunderbird-enigmail-nb mozilla-thunderbird-enigmail-nl mozilla-thunderbird-enigmail-pl mozilla-thunderbird-enigmail-pt mozilla-thunderbird-enigmail-pt_BR mozilla-thunderbird-enigmail-ru mozilla-thunderbird-enigmail-sl mozilla-thunderbird-enigmail-sv mozilla-thunderbird-enigmail-tr mozilla-thunderbird-enigmail-vi mozilla-thunderbird-enigmail-zh_CN mozilla-thunderbird-enigmail-zh_TW mozilla-thunderbird-es_AR mozilla-thunderbird-es_ES mozilla-thunderbird-et mozilla-thunderbird-eu mozilla-thunderbird-fi mozilla-thunderbird-fr mozilla-thunderbird-fy mozilla-thunderbird-ga mozilla-thunderbird-gd mozilla-thunderbird-gl mozilla-thunderbird-he mozilla-thunderbird-hu mozilla-thunderbird-id mozilla-thunderbird-is mozilla-thunderbird-it mozilla-thunderbird-ja mozilla-thunderbird-ko mozilla-thunderbird-lightning mozilla-thunderbird-lt mozilla-thunderbird-nb_NO mozilla-thunderbird-nl mozilla-thunderbird-nn_NO mozilla-thunderbird-pl mozilla-thunderbird-pt_BR mozilla-thunderbird-pt_PT mozilla-thunderbird-ro mozilla-thunderbird-ru mozilla-thunderbird-si mozilla-thunderbird-sk mozilla-thunderbird-sl mozilla-thunderbird-sq mozilla-thunderbird-sv_SE mozilla-thunderbird-ta_LK mozilla-thunderbird-tr mozilla-thunderbird-uk mozilla-thunderbird-vi mozilla-thunderbird-zh_CN mozilla-thunderbird-zh_TW nsinstall nss rootcerts rootcerts-java Update: Thu Feb 23 18:18:40 2012 Importance: security ID: MDVSA-2012:022 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:022 %pre Security issues were identified and fixed in mozilla firefox and thunderbird: An integer overflow in the libpng library can lead to a heap-buffer overflow when decompressing certain PNG images. This leads to a crash, which may be potentially exploitable (CVE-2011-3026). The mozilla firefox and thunderbird packages has been upgraded to the latest respective versions whish is not affecte dby this security flaw. Additionally the rootcerts packages (root CA cerificates bundle) has been upgraded to the latest version as of 2012/02/18 and the NSS library has been rebuilt accordingly to pickup the changes. %description This is a bundle of X.509 certificates of public Certificate Authorities (CA). These were automatically extracted from Mozilla's root CA list (the file "certdata.txt"). It contains the certificates in both plain text and PEM format and therefore can be directly used with an Apache/mod_ssl webserver for SSL client authentication. Just configure this file as the SSLCACertificateFile. %package lib64vpx0 lib64vpx-devel libvpx-utils Update: Mon Feb 27 10:25:45 2012 Importance: security ID: MDVSA-2012:023 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:023 %pre A vulnerability has been found and corrected in libvpx: VP8 Codec SDK (libvpx) before 1.0.0 Duclair allows remote attackers to cause a denial of service (application crash) via (1) unspecified corrupt input or (2) by starting decoding from a P-frame, which triggers an out-of-bounds read, related to the clamping of motion vectors in SPLITMV blocks (CVE-2012-0823). The updated packages have been patched to correct this issue. %description libvpx provides the VP8 SDK, which allows you to integrate your applications with the VP8 video codec, a high quality, royalty free, open source codec deployed on millions of computers and devices worldwide. %package firefox firefox-af firefox-ar firefox-ast firefox-be firefox-bg firefox-bn_BD firefox-bn_IN firefox-br firefox-bs firefox-ca firefox-cs firefox-cy firefox-da firefox-de firefox-devel firefox-el firefox-en_GB firefox-en_ZA firefox-eo firefox-es_AR firefox-es_CL firefox-es_ES firefox-es_MX firefox-et firefox-eu firefox-fa firefox-fi firefox-fr firefox-fy firefox-ga_IE firefox-gd firefox-gl firefox-gu_IN firefox-he firefox-hi firefox-hr firefox-hu firefox-hy firefox-id firefox-is firefox-it firefox-ja firefox-kk firefox-kn firefox-ko firefox-ku firefox-lg firefox-lt firefox-lv firefox-mai firefox-mk firefox-ml firefox-mr firefox-nb_NO firefox-nl firefox-nn_NO firefox-nso firefox-or firefox-pa_IN firefox-pl firefox-pt_BR firefox-pt_PT firefox-ro firefox-ru firefox-si firefox-sk firefox-sl firefox-sq firefox-sr firefox-sv_SE firefox-ta firefox-ta_LK firefox-te firefox-th firefox-tr firefox-uk firefox-vi firefox-zh_CN firefox-zh_TW firefox-zu lib64nss3 lib64nss-devel lib64nss-static-devel mozilla-thunderbird mozilla-thunderbird-ar mozilla-thunderbird-be mozilla-thunderbird-bg mozilla-thunderbird-bn_BD mozilla-thunderbird-br mozilla-thunderbird-ca mozilla-thunderbird-cs mozilla-thunderbird-da mozilla-thunderbird-de mozilla-thunderbird-el mozilla-thunderbird-en_GB mozilla-thunderbird-enigmail mozilla-thunderbird-enigmail-ar mozilla-thunderbird-enigmail-ca mozilla-thunderbird-enigmail-cs mozilla-thunderbird-enigmail-de mozilla-thunderbird-enigmail-el mozilla-thunderbird-enigmail-es mozilla-thunderbird-enigmail-fi mozilla-thunderbird-enigmail-fr mozilla-thunderbird-enigmail-it mozilla-thunderbird-enigmail-ja mozilla-thunderbird-enigmail-ko mozilla-thunderbird-enigmail-nb mozilla-thunderbird-enigmail-nl mozilla-thunderbird-enigmail-pl mozilla-thunderbird-enigmail-pt mozilla-thunderbird-enigmail-pt_BR mozilla-thunderbird-enigmail-ru mozilla-thunderbird-enigmail-sl mozilla-thunderbird-enigmail-sv mozilla-thunderbird-enigmail-tr mozilla-thunderbird-enigmail-vi mozilla-thunderbird-enigmail-zh_CN mozilla-thunderbird-enigmail-zh_TW mozilla-thunderbird-es_AR mozilla-thunderbird-es_ES mozilla-thunderbird-et mozilla-thunderbird-eu mozilla-thunderbird-fi mozilla-thunderbird-fr mozilla-thunderbird-fy mozilla-thunderbird-ga mozilla-thunderbird-gd mozilla-thunderbird-gl mozilla-thunderbird-he mozilla-thunderbird-hu mozilla-thunderbird-id mozilla-thunderbird-is mozilla-thunderbird-it mozilla-thunderbird-ja mozilla-thunderbird-ko mozilla-thunderbird-lightning mozilla-thunderbird-lt mozilla-thunderbird-nb_NO mozilla-thunderbird-nl mozilla-thunderbird-nn_NO mozilla-thunderbird-pl mozilla-thunderbird-pt_BR mozilla-thunderbird-pt_PT mozilla-thunderbird-ro mozilla-thunderbird-ru mozilla-thunderbird-si mozilla-thunderbird-sk mozilla-thunderbird-sl mozilla-thunderbird-sq mozilla-thunderbird-sv_SE mozilla-thunderbird-ta_LK mozilla-thunderbird-tr mozilla-thunderbird-uk mozilla-thunderbird-vi mozilla-thunderbird-zh_CN mozilla-thunderbird-zh_TW nsinstall nss rootcerts rootcerts-java Update: Tue Feb 28 12:11:13 2012 Importance: security ID: MDVSA-2012:022-1 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:022-1 %pre Security issues were identified and fixed in mozilla firefox and thunderbird: An integer overflow in the libpng library can lead to a heap-buffer overflow when decompressing certain PNG images. This leads to a crash, which may be potentially exploitable (CVE-2011-3026). The mozilla firefox and thunderbird packages has been upgraded to the latest respective versions whish is not affecte dby this security flaw. Additionally the rootcerts packages (root CA cerificates bundle) has been upgraded to the latest version as of 2012/02/18 and the NSS library has been rebuilt accordingly to pickup the changes. Update: This is a symbolic advisory correction because there was a clash with MDVSA-2012:022 that addressed libpng. %description This is a bundle of X.509 certificates of public Certificate Authorities (CA). These were automatically extracted from Mozilla's root CA list (the file "certdata.txt"). It contains the certificates in both plain text and PEM format and therefore can be directly used with an Apache/mod_ssl webserver for SSL client authentication. Just configure this file as the SSLCACertificateFile. %package firefox firefox-af firefox-ar firefox-ast firefox-be firefox-bg firefox-bn_BD firefox-bn_IN firefox-br firefox-bs firefox-ca firefox-cs firefox-cy firefox-da firefox-de firefox-devel firefox-el firefox-en_GB firefox-en_ZA firefox-eo firefox-es_AR firefox-es_CL firefox-es_ES firefox-es_MX firefox-et firefox-eu firefox-fa firefox-fi firefox-fr firefox-fy firefox-ga_IE firefox-gd firefox-gl firefox-gu_IN firefox-he firefox-hi firefox-hr firefox-hu firefox-hy firefox-id firefox-is firefox-it firefox-ja firefox-kk firefox-kn firefox-ko firefox-ku firefox-lg firefox-lt firefox-lv firefox-mai firefox-mk firefox-ml firefox-mr firefox-nb_NO firefox-nl firefox-nn_NO firefox-nso firefox-or firefox-pa_IN firefox-pl firefox-pt_BR firefox-pt_PT firefox-ro firefox-ru firefox-si firefox-sk firefox-sl firefox-sq firefox-sr firefox-sv_SE firefox-ta firefox-ta_LK firefox-te firefox-th firefox-tr firefox-uk firefox-vi firefox-zh_CN firefox-zh_TW firefox-zu lib64nss3 lib64nss-devel lib64nss-static-devel mozilla-thunderbird mozilla-thunderbird-ar mozilla-thunderbird-be mozilla-thunderbird-bg mozilla-thunderbird-bn_BD mozilla-thunderbird-br mozilla-thunderbird-ca mozilla-thunderbird-cs mozilla-thunderbird-da mozilla-thunderbird-de mozilla-thunderbird-el mozilla-thunderbird-en_GB mozilla-thunderbird-enigmail mozilla-thunderbird-enigmail-ar mozilla-thunderbird-enigmail-ca mozilla-thunderbird-enigmail-cs mozilla-thunderbird-enigmail-de mozilla-thunderbird-enigmail-el mozilla-thunderbird-enigmail-es mozilla-thunderbird-enigmail-fi mozilla-thunderbird-enigmail-fr mozilla-thunderbird-enigmail-it mozilla-thunderbird-enigmail-ja mozilla-thunderbird-enigmail-ko mozilla-thunderbird-enigmail-nb mozilla-thunderbird-enigmail-nl mozilla-thunderbird-enigmail-pl mozilla-thunderbird-enigmail-pt mozilla-thunderbird-enigmail-pt_BR mozilla-thunderbird-enigmail-ru mozilla-thunderbird-enigmail-sl mozilla-thunderbird-enigmail-sv mozilla-thunderbird-enigmail-tr mozilla-thunderbird-enigmail-vi mozilla-thunderbird-enigmail-zh_CN mozilla-thunderbird-enigmail-zh_TW mozilla-thunderbird-es_AR mozilla-thunderbird-es_ES mozilla-thunderbird-et mozilla-thunderbird-eu mozilla-thunderbird-fi mozilla-thunderbird-fr mozilla-thunderbird-fy mozilla-thunderbird-ga mozilla-thunderbird-gd mozilla-thunderbird-gl mozilla-thunderbird-he mozilla-thunderbird-hu mozilla-thunderbird-id mozilla-thunderbird-is mozilla-thunderbird-it mozilla-thunderbird-ja mozilla-thunderbird-ko mozilla-thunderbird-lightning mozilla-thunderbird-lt mozilla-thunderbird-nb_NO mozilla-thunderbird-nl mozilla-thunderbird-nn_NO mozilla-thunderbird-pl mozilla-thunderbird-pt_BR mozilla-thunderbird-pt_PT mozilla-thunderbird-ro mozilla-thunderbird-ru mozilla-thunderbird-si mozilla-thunderbird-sk mozilla-thunderbird-sl mozilla-thunderbird-sq mozilla-thunderbird-sv_SE mozilla-thunderbird-ta_LK mozilla-thunderbird-tr mozilla-thunderbird-uk mozilla-thunderbird-vi mozilla-thunderbird-zh_CN mozilla-thunderbird-zh_TW nsinstall nss rootcerts rootcerts-java Update: Tue Feb 28 12:16:29 2012 Importance: security ID: MDVSA-2012:022-1 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:022-1 %pre Security issues were identified and fixed in mozilla firefox and thunderbird: An integer overflow in the libpng library can lead to a heap-buffer overflow when decompressing certain PNG images. This leads to a crash, which may be potentially exploitable (CVE-2011-3026). The mozilla firefox and thunderbird packages has been upgraded to the latest respective versions whish is not affecte dby this security flaw. Additionally the rootcerts packages (root CA cerificates bundle) has been upgraded to the latest version as of 2012/02/18 and the NSS library has been rebuilt accordingly to pickup the changes. Update: This is a symbolic advisory correction because there was a clash with MDVSA-2012:022 that addressed libpng. %description This is a bundle of X.509 certificates of public Certificate Authorities (CA). These were automatically extracted from Mozilla's root CA list (the file "certdata.txt"). It contains the certificates in both plain text and PEM format and therefore can be directly used with an Apache/mod_ssl webserver for SSL client authentication. Just configure this file as the SSLCACertificateFile. %package lib64vpx0 lib64vpx-devel libvpx-utils Update: Tue Feb 28 12:40:42 2012 Importance: security ID: MDVSA-2012:023-1 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:023-1 %pre A vulnerability has been found and corrected in libvpx: VP8 Codec SDK (libvpx) before 1.0.0 Duclair allows remote attackers to cause a denial of service (application crash) via (1) unspecified corrupt input or (2) by starting decoding from a P-frame, which triggers an out-of-bounds read, related to the clamping of motion vectors in SPLITMV blocks (CVE-2012-0823). The updated packages have been patched to correct this issue. Update: This is a symbolic advisory correction because there was a clash with MDVSA-2012:023 that addressed libxml2. %description libvpx provides the VP8 SDK, which allows you to integrate your applications with the VP8 video codec, a high quality, royalty free, open source codec deployed on millions of computers and devices worldwide. %package ruby ruby-devel ruby-doc ruby-tk Update: Tue Feb 28 15:58:42 2012 Importance: security ID: MDVSA-2012:024 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:024 %pre A vulnerability has been found and corrected in ruby: Ruby (aka CRuby) before 1.8.7-p357 computes hash values without restricting the ability to trigger hash collisions predictably, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table (CVE-2011-4815). The updated packages have been patched to correct this issue. %description Ruby is the interpreted scripting language for quick and easy object-oriented programming. It has many features to process text files and to do system management tasks (as in Perl). It is simple, straight-forward, and extensible. %package kde4-filesharing kdenetwork4 kdenetwork4-devel kdenetwork4-kopete-latex kdnssd kget kopete kppp kppp-provider krdc krfb lib64kgetcore4 lib64kopete4 lib64kopeteaddaccountwizard1 lib64kopetechatwindow_shared1 lib64kopetecontactlist1 lib64kopeteidentity1 lib64kopete_oscar4 lib64kopete_otr_shared1 lib64kopeteprivacy1 lib64kopetestatusmenu1 lib64kopete_videodevice4 lib64krdccore1 lib64krfbprivate4 lib64kyahoo1 lib64oscar1 Update: Wed Feb 29 08:20:48 2012 Importance: bugfix ID: MDVA-2012:023 URL: http://www.mandriva.com/security/advisories?name=MDVA-2012:023 %pre - Moved krdc menu entry from Internet to Utilities->System; - Moved krfb menu entry from Internet to Utilities->System; - Added a lot of russian translations and fixes. %description Networking applications for the K Desktop Environment. - kdict: graphical client for the DICT protocol. - kit: AOL instant messenger client, using the TOC protocol - kpf: public fileserver applet - krfb: Desktop Sharing server, allow others to access your desktop via VNC - krdc: a client for Desktop Sharing and other VNC servers %package lib64ecpg9.0_6 lib64pq9.0_5 postgresql9.0 postgresql9.0-contrib postgresql9.0-devel postgresql9.0-docs postgresql9.0-pl postgresql9.0-plperl postgresql9.0-plpgsql postgresql9.0-plpython postgresql9.0-pltcl postgresql9.0-server Update: Wed Feb 29 13:20:41 2012 Importance: security ID: MDVSA-2012:026 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:026 %pre Multiple vulnerabilities has been discovered and corrected in postgresql: Permissions on a function called by a trigger are not properly checked (CVE-2012-0866). SSL certificate name checks are truncated to 32 characters, allowing connection spoofing under some circumstances when using third party certificate authorities (CVE-2012-0867). Line breaks in object names can be exploited to execute arbitrary SQL when reloading a pg_dump file (CVE-2012-0868). This advisory provides the latest versions of PostgreSQL that is not vulnerable to these issues. %description PostgreSQL is an advanced Object-Relational database management system (DBMS) that supports almost all SQL constructs (including transactions, subselects and user-defined types and functions). The postgresql package includes the client programs and libraries that you'll need to access a PostgreSQL DBMS server. These PostgreSQL client programs are programs that directly manipulate the internal structure of PostgreSQL databases on a PostgreSQL server. These client programs can be located on the same machine with the PostgreSQL server, or may be on a remote machine which accesses a PostgreSQL server over a network connection. This package contains the client libraries for C and C++, as well as command-line utilities for managing PostgreSQL databases on a PostgreSQL server. If you want to manipulate a PostgreSQL database on a remote PostgreSQL server, you need this package. You also need to install this package if you're installing the postgresql-server package. %package lib64xslt1 lib64xslt-devel python-libxslt xsltproc Update: Thu Mar 01 05:59:48 2012 Importance: security ID: MDVSA-2012:028 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:028 %pre A vulnerability has been found and corrected in libxslt: libxslt allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors (CVE-2011-3970). The updated packages have been patched to correct this issue. %description This C library allows to transform XML files into other XML files (or HTML, text, ...) using the standard XSLT stylesheet transformation mechanism. %package smartmontools Update: Fri Mar 02 09:15:12 2012 Importance: bugfix ID: MDVA-2012:027 URL: http://www.mandriva.com/security/advisories?name=MDVA-2012:027 %pre smartd service was not starting on stock Mandriva 2011 smartmontools package, this version fixes the issue, the service starts now correctly. %description SMARTmontools controls and monitors storage devices using the Self-Monitoring, Analysis and Reporting Technology System (S.M.A.R.T.) built into ATA and SCSI Hard Drives. This is used to check the reliability of the hard drive and predict drive failures. The suite contains two utilities. The first, smartctl, is a command-line utility designed to perform simple S.M.A.R.T. tasks. The second, smartd, is a daemon that periodically monitors smart status and reports errors to syslog. The package is compatible with the ATA/ATAPI-5 specification. Future releases will be compatible with the ATA/ATAPI-6 and ATA/ATAPI-7 specifications. The package is intended to incorporate as much "vendor specific" and "reserved" information as possible about disk drives. man smartctl and man smartd will provide more information. %package gurpmi urpmi urpmi-dudf urpmi-ldap urpmi-parallel-ka-run urpmi-parallel-ssh Update: Fri Mar 02 09:48:25 2012 Importance: bugfix ID: MDVA-2012:028 URL: http://www.mandriva.com/security/advisories?name=MDVA-2012:028 %pre A bugfix that makes urpmi use inst.list file both when installing from repository and from a local file. %description urpmi is Mandriva Linux's console-based software installation tool. You can use it to install software from the console in the same way as you use the graphical Install Software tool (rpmdrake) to install software from the desktop. urpmi will follow package dependencies -- in other words, it will install all the other software required by the software you ask it to install -- and it's capable of obtaining packages from a variety of media, including the Mandriva Linux installation CD-ROMs, your local hard disk, and remote sources such as web or FTP sites. %package kdebase4-runtime kdebase4-runtime-devel kwallet-daemon lib64kwalletbackend4 lib64molletnetwork4 lib64nepomuksync4 phonon-xine-kcm Update: Thu Mar 08 11:34:07 2012 Importance: bugfix ID: MDVA-2012:029 URL: http://www.mandriva.com/security/advisories?name=MDVA-2012:029 %pre Move KNetAttach from 'Internet' to 'Utils' group. %description KDE 4 application runtime components. %package finch lib64finch0 lib64purple0 lib64purple-devel pidgin pidgin-bonjour pidgin-client pidgin-gevolution pidgin-i18n pidgin-meanwhile pidgin-perl pidgin-plugins pidgin-silc pidgin-tcl Update: Fri Mar 16 09:00:35 2012 Importance: security ID: MDVSA-2012:029 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:029 %pre Multiple vulnerabilities has been discovered and corrected in pidgin: The pidgin_conv_chat_rename_user function in gtkconv.c in Pidgin before 2.10.2 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) by changing a nickname while in an XMPP chat room (CVE-2011-4939). The msn_oim_report_to_user function in oim.c in the MSN protocol plugin in libpurple in Pidgin before 2.10.2 allows remote servers to cause a denial of service (application crash) via an OIM message that lacks UTF-8 encoding (CVE-2012-1178). This update provides pidgin 2.10.2, which is not vulnerable to these issues. %description Pidgin allows you to talk to anyone using a variety of messaging protocols including AIM, MSN, Yahoo!, Jabber, Bonjour, Gadu-Gadu, ICQ, IRC, Novell Groupwise, QQ, Lotus Sametime, SILC, Simple and Zephyr. These protocols are implemented using a modular, easy to use design. To use a protocol, just add an account using the account editor. Pidgin supports many common features of other clients, as well as many unique features, such as perl scripting, TCL scripting and C plugins. Pidgin is not affiliated with or endorsed by America Online, Inc., Microsoft Corporation, Yahoo! Inc., or ICQ Inc. %package systemd systemd-gtk systemd-sysvinit systemd-units Update: Fri Mar 16 17:24:16 2012 Importance: security ID: MDVSA-2012:030 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:030 %pre A vulnerability has been found and corrected in systemd: A TOCTOU race condition was found in the way the systemd-logind login manager of the systemd, a system and service manager for Linux, performed removal of particular records related with user session upon user logout. A local attacker could use this flaw to conduct symbolic link attacks, potentially leading to removal of arbitrary system file (CVE-2012-1174). The updated packages have been patched to correct this issue. %description systemd is a system and session manager for Linux, compatible with SysV and LSB init scripts. systemd provides aggressive parallelization capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, keeps track of processes using Linux cgroups, supports snapshotting and restoring of the system state, maintains mount and automount points and implements an elaborate transactional dependency-based service control logic. It can work as a drop-in replacement for sysvinit. %package systemd systemd-gtk systemd-sysvinit systemd-units Update: Sun Mar 18 07:38:19 2012 Importance: bugfix ID: MDVA-2012:030 URL: http://www.mandriva.com/security/advisories?name=MDVA-2012:030 %pre A regression was found with the MDVSA-2012:030 advisory causing failure at boot. The secteam would like to apologise for this misfortunate mistake. %description systemd is a system and session manager for Linux, compatible with SysV and LSB init scripts. systemd provides aggressive parallelization capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, keeps track of processes using Linux cgroups, supports snapshotting and restoring of the system state, maintains mount and automount points and implements an elaborate transactional dependency-based service control logic. It can work as a drop-in replacement for sysvinit. %package systemd systemd-gtk systemd-sysvinit systemd-units Update: Sun Mar 18 07:38:47 2012 Importance: bugfix ID: MDVA-2012:030 URL: http://www.mandriva.com/security/advisories?name=MDVA-2012:030 %pre A regression was found with the MDVSA-2012:030 advisory causing failure at boot. The secteam would like to apologise for this misfortunate mistake. %description systemd is a system and session manager for Linux, compatible with SysV and LSB init scripts. systemd provides aggressive parallelization capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, keeps track of processes using Linux cgroups, supports snapshotting and restoring of the system state, maintains mount and automount points and implements an elaborate transactional dependency-based service control logic. It can work as a drop-in replacement for sysvinit. %package firefox firefox-af firefox-ar firefox-ast firefox-be firefox-bg firefox-bn_BD firefox-bn_IN firefox-br firefox-bs firefox-ca firefox-cs firefox-cy firefox-da firefox-de firefox-devel firefox-el firefox-en_GB firefox-en_ZA firefox-eo firefox-es_AR firefox-es_CL firefox-es_ES firefox-es_MX firefox-et firefox-eu firefox-fa firefox-fi firefox-fr firefox-fy firefox-ga_IE firefox-gd firefox-gl firefox-gu_IN firefox-he firefox-hi firefox-hr firefox-hu firefox-hy firefox-id firefox-is firefox-it firefox-ja firefox-kk firefox-kn firefox-ko firefox-ku firefox-lg firefox-lt firefox-lv firefox-mai firefox-mk firefox-ml firefox-mr firefox-nb_NO firefox-nl firefox-nn_NO firefox-nso firefox-or firefox-pa_IN firefox-pl firefox-pt_BR firefox-pt_PT firefox-ro firefox-ru firefox-si firefox-sk firefox-sl firefox-sq firefox-sr firefox-sv_SE firefox-ta firefox-ta_LK firefox-te firefox-th firefox-tr firefox-uk firefox-vi firefox-zh_CN firefox-zh_TW firefox-zu icedtea-web icedtea-web-javadoc lib64nspr4 lib64nspr-devel lib64nss3 lib64nss-devel lib64nss-static-devel lib64xulrunner11.0 lib64xulrunner-devel mozilla-thunderbird mozilla-thunderbird-ar mozilla-thunderbird-be mozilla-thunderbird-bg mozilla-thunderbird-bn_BD mozilla-thunderbird-br mozilla-thunderbird-ca mozilla-thunderbird-cs mozilla-thunderbird-da mozilla-thunderbird-de mozilla-thunderbird-el mozilla-thunderbird-en_GB mozilla-thunderbird-enigmail mozilla-thunderbird-enigmail-ar mozilla-thunderbird-enigmail-ca mozilla-thunderbird-enigmail-cs mozilla-thunderbird-enigmail-de mozilla-thunderbird-enigmail-el mozilla-thunderbird-enigmail-es mozilla-thunderbird-enigmail-fi mozilla-thunderbird-enigmail-fr mozilla-thunderbird-enigmail-it mozilla-thunderbird-enigmail-ja mozilla-thunderbird-enigmail-ko mozilla-thunderbird-enigmail-nb mozilla-thunderbird-enigmail-nl mozilla-thunderbird-enigmail-pl mozilla-thunderbird-enigmail-pt mozilla-thunderbird-enigmail-pt_BR mozilla-thunderbird-enigmail-ru mozilla-thunderbird-enigmail-sl mozilla-thunderbird-enigmail-sv mozilla-thunderbird-enigmail-tr mozilla-thunderbird-enigmail-vi mozilla-thunderbird-enigmail-zh_CN mozilla-thunderbird-enigmail-zh_TW mozilla-thunderbird-es_AR mozilla-thunderbird-es_ES mozilla-thunderbird-et mozilla-thunderbird-eu mozilla-thunderbird-fi mozilla-thunderbird-fr mozilla-thunderbird-fy mozilla-thunderbird-ga mozilla-thunderbird-gd mozilla-thunderbird-gl mozilla-thunderbird-he mozilla-thunderbird-hu mozilla-thunderbird-id mozilla-thunderbird-is mozilla-thunderbird-it mozilla-thunderbird-ja mozilla-thunderbird-ko mozilla-thunderbird-lightning mozilla-thunderbird-lt mozilla-thunderbird-nb_NO mozilla-thunderbird-nl mozilla-thunderbird-nn_NO mozilla-thunderbird-pl mozilla-thunderbird-pt_BR mozilla-thunderbird-pt_PT mozilla-thunderbird-ro mozilla-thunderbird-ru mozilla-thunderbird-si mozilla-thunderbird-sk mozilla-thunderbird-sl mozilla-thunderbird-sq mozilla-thunderbird-sv_SE mozilla-thunderbird-ta_LK mozilla-thunderbird-tr mozilla-thunderbird-uk mozilla-thunderbird-vi mozilla-thunderbird-zh_CN mozilla-thunderbird-zh_TW nsinstall nss xulrunner Update: Tue Mar 20 16:44:53 2012 Importance: security ID: MDVSA-2012:032 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:032 %pre Security issues were identified and fixed in mozilla firefox and thunderbird: Security researchers Blair Strang and Scott Bell of Security Assessment found that when a parent window spawns and closes a child window that uses the file open dialog, a crash can be induced in shlwapi.dll on 32-bit Windows 7 systems. This crash may be potentially exploitable (CVE-2012-0454). Firefox prevents the dropping of javascript: links onto a frame to prevent malicious sites from tricking users into performing a cross-site scripting (XSS) attacks on themselves. Security researcher Soroush Dalili reported a way to bypass this protection (CVE-2012-0455). Security researcher Atte Kettunen from OUSPG found two issues with Firefox's handling of SVG using the Address Sanitizer tool. The first issue, critically rated, is a use-after-free in SVG animation that could potentially lead to arbitrary code execution. The second issue is rated moderate and is an out of bounds read in SVG Filters. This could potentially incorporate data from the user's memory, making it accessible to the page content (CVE-2012-0457, CVE-2012-0456). Security Researcher Mike Brooks of Sitewatch reported that if multiple Content Security Policy (CSP) headers are present on a page, they have an additive effect page policy. Using carriage return line feed (CRLF) injection, a new CSP rule can be introduced which allows for cross-site scripting (XSS) on sites with a separate header injection vulnerability (CVE-2012-0451). Security researcher Mariusz Mlynski reported that an attacker able to convince a potential victim to set a new home page by dragging a link to the home button can set that user's home page to a javascript: URL. Once this is done the attacker's page can cause repeated crashes of the browser, eventually getting the script URL loaded in the privileged about:sessionrestore context (CVE-2012-0458). Mozilla community member Daniel Glazman of Disruptive Innovations reported a crash when accessing a keyframe's cssText after dynamic modification. This crash may be potentially exploitable (CVE-2012-0459). Mozilla developer Matt Brubeck reported that window.fullScreen is writeable by untrusted content now that the DOM fullscreen API is enabled. Because window.fullScreen does not include mozRequestFullscreen's security protections, it could be used for UI spoofing. This code change makes window.fullScreen read only by untrusted content, forcing the use of the DOM fullscreen API in normal usage (CVE-2012-0460). Mozilla developers identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these bugs showed evidence of memory corruption under certain circumstances, and we presume that with enough effort at least some of these could be exploited to run arbitrary code (CVE-2012-0461, CVE-2012-0462, CVE-2012-0464). The mozilla firefox and thunderbird packages has been upgraded to the latest respective versions which is unaffected by these security flaws. Additionally the NSS and NSPR packages has been upgraded to the latest versions. The OpenJDK java plugin (icedtea-web) has been upgraded to the 1.1.5 version whish bas better support for firefox 10.x+. %description XULRunner is a Mozilla runtime package that can be used to bootstrap XUL+XPCOM applications that are as rich as Firefox and Thunderbird. It will provide mechanisms for installing, upgrading, and uninstalling these applications. XULRunner will also provide libxul, a solution which allows the embedding of Mozilla technologies in other projects and products. %package lib64png3 lib64png-devel lib64png-static-devel libpng-source Update: Wed Mar 21 09:45:31 2012 Importance: security ID: MDVSA-2012:033 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:033 %pre A vulnerability has been found and corrected in libpng: A heap-based buffer overflow flaw was found in the way libpng processed compressed chunks in PNG image files. An attacker could create a specially-crafted PNG image file that, when opened, could cause an application using libpng to crash or, possibly, execute arbitrary code with the privileges of the user running the application (CVE-2011-3045). The updated packages have been patched to correct this issue. %description The libpng package contains a library of functions for creating and manipulating PNG (Portable Network Graphics) image format files. PNG is a bit-mapped graphics format similar to the GIF format. PNG was created to replace the GIF format, since GIF uses a patented data compression algorithm. Libpng should be installed if you need to manipulate PNG format image files. %package lib64mysql18 lib64mysqld0 lib64mysql-devel lib64mysqlservices0 lib64mysql-static-devel mysql mysql-bench mysql-client mysql-common mysql-common-core mysql-core Update: Thu Mar 22 14:21:15 2012 Importance: bugfix ID: MDVA-2012:031 URL: http://www.mandriva.com/security/advisories?name=MDVA-2012:031 %pre This is a maintenance and bugfix release that upgrades mysql to the latest respective version which resolves various upstream bugs. %description The MySQL(TM) software delivers a very fast, multi-threaded, multi-user, and robust SQL (Structured Query Language) database server. MySQL Server is intended for mission-critical, heavy-load production systems as well as for embedding into mass-deployed software. MySQL is a trademark of MySQL AB. The mysql server is compiled with the following storage engines: - InnoDB Storage Engine - Archive Storage Engine - CSV Storage Engine - Federated Storage Engine - User Defined Functions (UDFs). - Blackhole Storage Engine - Partition Storage Engine - Perfschema Storage Engine %package lib64zip2 lib64zip-devel libzip Update: Fri Mar 23 08:06:32 2012 Importance: security ID: MDVSA-2012:034 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:034 %pre Multiple vulnerabilities has been found and corrected in libzip: libzip (version <= 0.10) uses an incorrect loop construct, which can result in a heap overflow on corrupted zip files (CVE-2012-1162). libzip (version <= 0.10) has a numeric overflow condition, which, for example, results in improper restrictions of operations within the bounds of a memory buffer (e.g., allowing information leaks) (CVE-2012-1163). The updated packages have been upgraded to the 0.10.1 version to correct these issues. %description libzip is a C library for reading, creating, and modifying zip archives. Files can be added from data buffers, files, or compressed data copied directly from other zip archives. Changes made without closing the archive can be reverted. The API is documented by man pages. %package file lib64magic1 lib64magic-devel lib64magic-static-devel python-magic Update: Fri Mar 23 08:36:31 2012 Importance: security ID: MDVSA-2012:035 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:035 %pre Multiple out-of heap-based buffer read flaws and invalid pointer dereference flaws were found in the way file, utility for determining of file types processed header section for certain Composite Document Format (CDF) files. A remote attacker could provide a specially-crafted CDF file, which once inspected by the file utility of the victim would lead to file executable crash (CVE-2012-1571). The updated packages for Mandriva Linux 2011 have been upgraded to the 5.11 version and the packages for Mandriva Linux 2010.2 has been patched to correct these issues. %description The file command is used to identify a particular file according to the type of data contained by the file. File can identify many different file types, including ELF binaries, system libraries, RPM packages, and different graphics formats. You should install the file package, since the file command is such a useful utility. %package lib64soup-2.4_1 lib64soup-2.4-devel Update: Fri Mar 23 12:11:44 2012 Importance: security ID: MDVSA-2012:036 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:036 %pre A vulnerability has been found and corrected in libsoup: Directory traversal vulnerability in soup-uri.c in SoupServer in libsoup before 2.35.4 allows remote attackers to read arbitrary files via a \%2e\%2e (encoded dot dot) in a URI (CVE-2011-2524). The updated packages have been patched to correct this issue. %description Soup is a SOAP (Simple Object Access Protocol) implementation in C. It provides an queued asynchronous callback-based mechanism for sending and servicing SOAP requests, and a WSDL (Web Service Definition Language) to C compiler which generates client stubs and server skeletons for easily calling and implementing SOAP methods. %package cyrus-imapd cyrus-imapd-devel cyrus-imapd-murder cyrus-imapd-nntp cyrus-imapd-utils perl-Cyrus Update: Fri Mar 23 13:05:09 2012 Importance: security ID: MDVSA-2012:037 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:037 %pre A vulnerability has been found and corrected in cyrus-imapd: The index_get_ids function in index.c in imapd in Cyrus IMAP Server before 2.4.11, when server-side threading is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted References header in an e-mail message (CVE-2011-3481). The updated packages have been patched to correct this issue. %description The Cyrus IMAP Server is a scaleable enterprise mail system designed for use from small to large enterprise environments using standards-based technologies. A full Cyrus IMAP implementation allows a seamless mail and bulletin board environment to be set up across multiple servers. It differs from other IMAP server implementations in that it is run on "sealed" servers, where users are not normally permitted to log in. The mailbox database is stored in parts of the filesystem that are private to the Cyrus IMAP system. All user access to mail is through software using the IMAP, POP3, or KPOP protocols. TLSv1 and SSL are supported for security. This is the main package, install also the cyrus-imapd-utils package (it contains server administration tools and depends on the perl-Cyrus package). %package lib64openssl1.0.0 lib64openssl-devel lib64openssl-engines1.0.0 lib64openssl-static-devel openssl Update: Mon Mar 26 15:26:24 2012 Importance: security ID: MDVSA-2012:038 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:038 %pre Multiple vulnerabilities has been found and corrected in openssl: The implementation of Cryptographic Message Syntax (CMS) and PKCS #7 in OpenSSL before 0.9.8u and 1.x before 1.0.0h does not properly restrict certain oracle behavior, which makes it easier for context-dependent attackers to decrypt data via a Million Message Attack (MMA) adaptive chosen ciphertext attack (CVE-2012-0884). The mime_param_cmp function in crypto/asn1/asn_mime.c in OpenSSL before 0.9.8u and 1.x before 1.0.0h allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted S/MIME message, a different vulnerability than CVE-2006-7250 (CVE-2012-1165). The updated packages have been patched to correct these issues. %description The openssl certificate management tool and the shared libraries that provide various encryption and decription algorithms and protocols, including DES, RC4, RSA and SSL. %package lib64tasn1_3 lib64tasn1-devel libtasn1-tools Update: Tue Mar 27 09:25:33 2012 Importance: security ID: MDVSA-2012:039 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:039 %pre A vulnerability has been found and corrected in libtasn1: The asn1_get_length_der function in decoding.c in GNU Libtasn1 before 2.12, as used in GnuTLS before 3.0.16 and other products, does not properly handle certain large length values, which allows remote attackers to cause a denial of service (heap memory corruption and application crash) or possibly have unspecified other impact via a crafted ASN.1 structure (CVE-2012-1569). The updated packages have been patched to correct this issue. %description Libtasn1 is an implementation of the ASN.1 standard used by GnuTLS and others. %package lib64lockdev1 lib64lockdev1-devel lockdev-baudboy perl-LockDev Update: Tue Mar 27 14:22:47 2012 Importance: bugfix ID: MDVA-2012:033 URL: http://www.mandriva.com/security/advisories?name=MDVA-2012:033 %pre A problem was discovered with a missing lock group while starting Mandriva Linux 2011 with systemd. This advisory solves the problem. %description Lockdev provides a reliable way to put an exclusive lock to devices using both FSSTND and SVr4 methods. %package gnutls lib64gnutls26 lib64gnutls-devel lib64gnutls-ssl27 lib64p11-kit0 lib64p11-kit-devel p11-kit Update: Tue Mar 27 14:34:58 2012 Importance: security ID: MDVSA-2012:040 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:040 %pre A vulnerability has been found and corrected in GnuTLS: gnutls_cipher.c in libgnutls in GnuTLS before 2.12.17 and 3.x before 3.0.15 does not properly handle data encrypted with a block cipher, which allows remote attackers to cause a denial of service (heap memory corruption and application crash) via a crafted record, as demonstrated by a crafted GenericBlockCipher structure (CVE-2012-1573). The updated packages have been patched to correct this issue. The GnuTLS packages for Mandriva Linux 2011 has been upgraded to the 2.12.8 version due to problems with the test suite while building it, additionally a new dependency was added on p11-kit for the PKCS #11 support. %description Provides a way to load and enumerate PKCS#11 modules. Provides a standard configuration setup for installing PKCS#11 modules in such a way that they're discoverable. Also solves problems with coordinating the use of PKCS#11 by different components or libraries living in the same process. %package expat lib64expat1 lib64expat-devel lib64expat-static-devel Update: Tue Mar 27 17:35:48 2012 Importance: security ID: MDVSA-2012:041 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:041 %pre A memory leak and a hash table collision flaw in expat could cause denial os service (DoS) attacks (CVE-2012-0876, CVE-2012-1148). The updated packages have been patched to correct this issue. %description Expat is an XML 1.0 parser written in C by James Clark. It aims to be fully conforming. It is currently not a validating XML parser. %package dumpcap lib64wireshark1 lib64wireshark-devel rawshark tshark wireshark wireshark-tools Update: Wed Mar 28 12:41:16 2012 Importance: security ID: MDVSA-2012:042 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:042 %pre Multiple vulnerabilities was found and corrected in Wireshark: * The ANSI A dissector could dereference a NULL pointer and crash. * The IEEE 802.11 dissector could go into an infinite loop. * The pcap and pcap-ng file parsers could crash trying to read ERF data. * The MP2T dissector could try to allocate too much memory and crash. This advisory provides the latest version of Wireshark (1.6.6) which is not vulnerable to these issues. %description Wireshark is a network traffic analyzer for Unix-ish operating systems. It is based on GTK+, a graphical user interface library, and libpcap, a packet capture and filtering library. Wireshark is a fork of Ethereal(tm) %package systemd systemd-gtk systemd-sysvinit systemd-units Update: Wed Mar 28 14:13:07 2012 Importance: bugfix ID: MDVA-2012:030-1 URL: http://www.mandriva.com/security/advisories?name=MDVA-2012:030-1 %pre A regression was found with the MDVSA-2012:030 advisory causing failure at boot. The secteam would like to apologise for this misfortunate mistake. Update: After further analysis it was discovered that it was a problem with the build system used to build the Mandriva updates that caused problems for some users. This advisory solves the problem. %description systemd is a system and session manager for Linux, compatible with SysV and LSB init scripts. systemd provides aggressive parallelization capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, keeps track of processes using Linux cgroups, supports snapshotting and restoring of the system state, maintains mount and automount points and implements an elaborate transactional dependency-based service control logic. It can work as a drop-in replacement for sysvinit. %package nginx Update: Thu Mar 29 08:10:35 2012 Importance: security ID: MDVSA-2012:043 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:043 %pre A vulnerability has been found and corrected in nginx: Specially crafted backend response could result in sensitive information leak (CVE-2012-1180). The updated packages have been patched to correct this issue. %description Nginx [engine x] is an HTTP(S) server, HTTP(S) reverse proxy and IMAP/POP3 proxy server written by Igor Sysoev. %package cvs Update: Thu Mar 29 10:04:41 2012 Importance: security ID: MDVSA-2012:044 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:044 %pre A vulnerability has been found and corrected in cvs: A heap-based buffer overflow flaw was found in the way the CVS client handled responses from HTTP proxies. A malicious HTTP proxy could use this flaw to cause the CVS client to crash or, possibly, execute arbitrary code with the privileges of the user running the CVS client (CVE-2012-0804). The updated packages have been patched to correct this issue. %description CVS means Concurrent Version System; it is a version control system which can record the history of your files (usually, but not always, source code). CVS only stores the differences between versions, instead of every version of every file you've ever created. CVS also keeps a log of who, when and why changes occurred, among other aspects. CVS is very helpful for managing releases and controlling the concurrent editing of source files among multiple authors. Instead of providing version control for a collection of files in a single directory, CVS provides version control for a hierarchical collection of directories consisting of revision controlled files. These directories and files can then be combined together to form a software release. Install the cvs package if you need to use a version control system. %package gnutls lib64gnutls26 lib64gnutls-devel lib64gnutls-ssl27 Update: Fri Mar 30 15:28:23 2012 Importance: security ID: MDVSA-2012:045 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:045 %pre A vulnerability has been found and corrected in GnuTLS: Buffer overflow in the gnutls_session_get_data function in lib/gnutls_session.c in GnuTLS 2.12.x before 2.12.14 and 3.x before 3.0.7, when used on a client that performs nonstandard session resumption, allows remote TLS servers to cause a denial of service (application crash) via a large SessionTicket (CVE-2011-4128). The updated packages have been patched to correct this issue. %description GnuTLS is a project that aims to develop a library which provides a secure layer, over a reliable transport layer. %package lib64png3 lib64png-devel lib64png-static-devel libpng-source Update: Mon Apr 02 07:02:26 2012 Importance: security ID: MDVSA-2012:046 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:046 %pre A potential memory corruption has been found and corrected in libpng (CVE-2011-3048). The updated packages have been patched to correct this issue. %description The libpng package contains a library of functions for creating and manipulating PNG (Portable Network Graphics) image format files. PNG is a bit-mapped graphics format similar to the GIF format. PNG was created to replace the GIF format, since GIF uses a patented data compression algorithm. Libpng should be installed if you need to manipulate PNG format image files. %package freeradius freeradius-krb5 freeradius-ldap freeradius-mysql freeradius-postgresql freeradius-sqlite freeradius-unixODBC freeradius-web lib64freeradius1 lib64freeradius-devel Update: Mon Apr 02 08:24:15 2012 Importance: security ID: MDVSA-2012:047 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:047 %pre A vulnerability has been found and corrected in freeradius: The ocsp_check function in rlm_eap_tls.c in FreeRADIUS 2.1.11, when OCSP is enabled, does not properly parse replies from OCSP responders, which allows remote attackers to bypass authentication by using the EAP-TLS protocol with a revoked X.509 client certificate (CVE-2011-2701). The updated packages have been patched to correct this issue. %description The FreeRADIUS Server Project is a high-performance and highly configurable GPL'd RADIUS server. It is somewhat similar to the Livingston 2.0 RADIUS server, but has many more features, and is much more configurable. %package mutt mutt-doc mutt-utf8 Update: Mon Apr 02 13:33:53 2012 Importance: security ID: MDVSA-2012:048 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:048 %pre A vulnerability has been found and corrected in mutt: Mutt does not verify that the smtps server hostname matches the domain name of the subject of an X.509 certificate, which allows man-in-the-middle attackers to spoof an SSL SMTP server via an arbitrary certificate, a different vulnerability than CVE-2009-3766 (CVE-2011-1429). The updated packages have been patched to correct this issue. %description Mutt is a text mode mail user agent. Mutt supports color, threading, arbitrary key remapping, and a lot of customization. You should install mutt if you've used mutt in the past and you prefer it, or if you're new to mail programs and you haven't decided which one you're going to use. %package lib64vorbis0 lib64vorbis-devel lib64vorbisenc2 lib64vorbisfile3 Update: Tue Apr 03 13:18:47 2012 Importance: security ID: MDVSA-2012:052 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:052 %pre A vulnerability has been found and corrected in libvorbis: If a specially-crafted Ogg Vorbis media file was opened by an application using libvorbis, it could cause the application to crash or, possibly, execute arbitrary code with the privileges of the user running the application (CVE-2012-0444). The updated packages have been patched to correct this issue. %description Ogg Vorbis is a fully open, non-proprietary, patent-and-royalty-free, general-purpose compressed audio format for audio and music at fixed and variable bitrates from 16 to 128 kbps/channel. Find some free Ogg Vorbis music here: http://www.vorbis.com/music.html %package lib64tiff3 lib64tiff-devel lib64tiff-static-devel libtiff-progs Update: Thu Apr 05 06:59:22 2012 Importance: security ID: MDVSA-2012:054 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:054 %pre A vulnerability has been found and corrected in libtiff: An integer overflow was discovered in the libtiff/tiff_getimage.c file in the tiff library which could cause execution of arbitrary code using a specially crafted TIFF image file (CVE-2012-1173). The updated packages have been patched to correct this issue. %description The libtiff package contains a library of functions for manipulating TIFF (Tagged Image File Format) image format files. TIFF is a widely used file format for bitmapped images. TIFF files usually end in the .tif extension and they are often quite large. %package bind bind-devel bind-doc bind-utils Update: Thu Apr 05 11:00:13 2012 Importance: bugfix ID: MDVA-2012:034 URL: http://www.mandriva.com/security/advisories?name=MDVA-2012:034 %pre This is a bugfix and maintenance release that upgrades ISC BIND to the latest respective versions which resolves numerous upstream bugs. %description BIND (Berkeley Internet Name Domain) is an implementation of the DNS (domain Name System) protocols. BIND includes a DNS server (named), which resolves host names to IP addresses, and a resolver library (routines for applications to use when interfacing with DNS). A DNS server allows clients to name resources or objects and share the information with other network machines. The named DNS server can be used on workstations as a caching name server, but is generally only needed on one machine for an entire network. Note that the configuration files for making BIND act as a simple caching nameserver are included in the caching-nameserver package. Install the bind package if you need a DNS server for your network. If you want bind to act a caching name server, you will also need to install the caching-nameserver package. Many BIND 8 features previously unimplemented in BIND 9, including domain-specific forwarding, the \$GENERATE master file directive, and the "blackhole", "dialup", and "sortlist" options Forwarding of dynamic update requests; this is enabled by the "allow-update-forwarding" option A new, simplified database interface and a number of sample drivers based on it; see doc/dev/sdb for details Support for building single-threaded servers for environments that do not supply POSIX threads New configuration options: "min-refresh-time", "max-refresh-time", "min-retry-time", "max-retry-time", "additional-from-auth", "additional-from-cache", "notify explicit" Faster lookups, particularly in large zones. Build Options: --without sdb_ldap Build without ldap simple database support (enabled per default) --with sdb_mysql Build with MySQL database support (disables ldap support, it's either way.) %package lib64netapi0 lib64netapi-devel lib64smbclient0 lib64smbclient0-devel lib64smbclient0-static-devel lib64smbsharemodes0 lib64smbsharemodes-devel lib64wbclient0 lib64wbclient-devel mount-cifs nss_wins samba-client samba-common samba-doc samba-domainjoin-gui samba-server samba-swat samba-winbind Update: Wed Apr 11 11:06:01 2012 Importance: security ID: MDVSA-2012:055 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:055 %pre A vulnerability has been found and corrected in samba: The RPC code generator in Samba 3.x before 3.4.16, 3.5.x before 3.5.14, and 3.6.x before 3.6.4 does not implement validation of an array length in a manner consistent with validation of array memory allocation, which allows remote attackers to execute arbitrary code via a crafted RPC call (CVE-2012-1182). The updated packages have been patched to correct this issue. %description Samba provides an SMB server which can be used to provide network services to SMB (sometimes called "Lan Manager") clients, including various versions of MS Windows, OS/2, and other Linux machines. Samba also provides some SMB clients, which complement the built-in SMB filesystem in Linux. Samba uses NetBIOS over TCP/IP (NetBT) protocols and does NOT need NetBEUI (Microsoft Raw NetBIOS frame) protocol. Samba-3.0 features working NT Domain Control capability and includes the SWAT (Samba Web Administration Tool) that allows samba's smb.conf file to be remotely managed using your favourite web browser. For the time being this is being enabled on TCP port 901 via xinetd. SWAT is now included in it's own subpackage, samba-swat. Please refer to the WHATSNEW.txt document for fixup information. This binary release includes encrypted password support. Please read the smb.conf file and ENCRYPTION.txt in the docs directory for implementation details. %package freetype2-demos lib64freetype6 lib64freetype6-devel lib64freetype6-static-devel Update: Thu Apr 12 12:47:44 2012 Importance: security ID: MDVSA-2012:057 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:057 %pre Multiple flaws were found in FreeType. Specially crafted files could cause application crashes or potentially execute arbitrary code (CVE-2012-1126, CVE-2012-1127, CVE-2012-1128, CVE-2012-1129, CVE-2012-1130, CVE-2012-1131, CVE-2012-1132, CVE-2012-1133, CVE-2012-1134, CVE-2012-1135, CVE-2012-1136, CVE-2012-1137, CVE-2012-1138, CVE-2012-1139, CVE-2012-1140, CVE-2012-1141, CVE-2012-1142, CVE-2012-1143, CVE-2012-1144). The updated packages have been patched to correct this issue. %description The FreeType2 engine is a free and portable TrueType font rendering engine. It has been developed to provide TT support to a great variety of platforms and environments. Note that FreeType2 is a library, not a stand-alone application, though some utility applications are included %package curl curl-examples lib64curl4 lib64curl-devel Update: Fri Apr 13 11:50:34 2012 Importance: security ID: MDVSA-2012:058 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:058 %pre Multiple vulnerabilities has been found and corrected in curl: curl is vulnerable to a SSL CBC IV vulnerability when built to use OpenSSL for the SSL/TLS layer. A work-around has been added to mitigate the problem (CVE-2011-3389). curl is vulnerable to a data injection attack for certain protocols through control characters embedded or percent-encoded in URLs (CVE-2012-0036). The updated packages have been patched to correct these issues. %description curl is a client to get documents/files from servers, using any of the supported protocols. The command is designed to work without user interaction or any kind of interactivity. curl offers a busload of useful tricks like proxy support, user authentication, ftp upload, HTTP post, file transfer resume and more. This version is compiled with SSL (https) support. %package bsdcpio bsdtar lib64archive2 lib64archive-devel Update: Sat Apr 14 09:39:01 2012 Importance: bugfix ID: MDVA-2012:035 URL: http://www.mandriva.com/security/advisories?name=MDVA-2012:035 %pre The MDVSA-2011:190 advisory introduced a regression conserning broken ISO support. The updated packages have been patched to correct this issue. %description Libarchive is a programming library that can create and read several different streaming archive formats, including most popular tar variants and several cpio formats. It can also write shar archives and read ISO9660 CDROM images and ZIP archives. The bsdtar program is an implementation of tar(1) that is built on top of libarchive. It started as a test harness, but has grown and is now the standard system tar for FreeBSD 5 and 6. %package python-sqlalchemy Update: Mon Apr 16 11:48:35 2012 Importance: security ID: MDVSA-2012:059 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:059 %pre It was discovered that SQLAlchemy did not sanitize values for the limit and offset keywords for SQL select statements. If an application using SQLAlchemy accepted values for these keywords, and did not filter or sanitize them before passing them to SQLAlchemy, it could allow an attacker to perform an SQL injection attack against the application (CVE-2012-0805). The updated packages have been patched to correct this issue. %description SQLAlchemy is a SQL toolkit and object relational mapper for Python. It encourages "relational mapping" as opposed to "table mapping" and includes enterprise-level features such as eager loading, unit-of-work object commits, topological dependency sorting, and full usage of bind parameters. It supports MySQL, Postgres, Oracle, and SQLite. %package lib64openssl1.0.0 lib64openssl-devel lib64openssl-engines1.0.0 lib64openssl-static-devel openssl Update: Thu Apr 19 16:38:26 2012 Importance: security ID: MDVSA-2012:060 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:060 %pre A potentially exploitable vulnerability has been discovered in the OpenSSL function asn1_d2i_read_bio that affects S/MIME or CMS applications using the built in MIME parser SMIME_read_PKCS7 or SMIME_read_CMS (CVE-2012-2110). The updated packages have been patched to correct this issue. %description The openssl certificate management tool and the shared libraries that provide various encryption and decription algorithms and protocols, including DES, RC4, RSA and SSL. %package lib64nss3 lib64nss-devel lib64nss-static-devel nss Update: Fri Apr 20 09:53:31 2012 Importance: bugfix ID: MDVA-2012:036 URL: http://www.mandriva.com/security/advisories?name=MDVA-2012:036 %pre This is a bugfix and maintenance release that upgrades nss to the latest version which resolves numerous upstream bugs. %description Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Applications built with NSS can support SSL v2 and v3, TLS, PKCS #5, PKCS #7, PKCS #11, PKCS #12, S/MIME, X.509 v3 certificates, and other security standards. For detailed information on standards supported, see http://www.mozilla.org/projects/security/pki/nss/overview.html. %package lib64raptor1 lib64raptor2_0 lib64raptor2-devel lib64raptor-devel raptor raptor2 Update: Sat Apr 21 13:42:31 2012 Importance: security ID: MDVSA-2012:061 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:061 %pre An XML External Entity expansion flaw was found in the way Raptor processed RDF files. If an application linked against Raptor were to open a specially-crafted RDF file, it could possibly allow a remote attacker to obtain a copy of an arbitrary local file that the user running the application had access to. A bug in the way Raptor handled external entities could cause that application to crash or, possibly, execute arbitrary code with the privileges of the user running the application (CVE-2012-0037). The updated packages have been patched to correct this issue. raptor2 for Mandriva Linux 2011 has been upgraded to the 2.0.7 version which is not vulnerable to this issue. %description Raptor is the RDF Parser Toolkit for Redland that provides a set of standalone RDF parsers, generating triples from RDF/XML or N-Triples. %package libreoffice libreoffice-base libreoffice-calc libreoffice-common libreoffice-core libreoffice-devel libreoffice-devel-doc libreoffice-draw libreoffice-filter-binfilter libreoffice-gnome libreoffice-help-bg libreoffice-help-bn libreoffice-help-bs libreoffice-help-ca libreoffice-help-cs libreoffice-help-da libreoffice-help-de libreoffice-help-dz libreoffice-help-el libreoffice-help-en_GB libreoffice-help-en_US libreoffice-help-es libreoffice-help-et libreoffice-help-eu libreoffice-help-fi libreoffice-help-fr libreoffice-help-gl libreoffice-help-gu libreoffice-help-he libreoffice-help-hi libreoffice-help-hr libreoffice-help-hu libreoffice-help-it libreoffice-help-ja libreoffice-help-ko libreoffice-help-mk libreoffice-help-nb libreoffice-help-nl libreoffice-help-nn libreoffice-help-pl libreoffice-help-pt libreoffice-help-pt_BR libreoffice-help-ru libreoffice-help-si libreoffice-help-sk libreoffice-help-sl libreoffice-help-sv libreoffice-help-tr libreoffice-help-uk libreoffice-help-zh_CN libreoffice-help-zh_TW libreoffice-impress libreoffice-java-common libreoffice-kde4 libreoffice-l10n-af libreoffice-l10n-ar libreoffice-l10n-as libreoffice-l10n-bg libreoffice-l10n-bn libreoffice-l10n-br libreoffice-l10n-bs libreoffice-l10n-ca libreoffice-l10n-cs libreoffice-l10n-cy libreoffice-l10n-da libreoffice-l10n-de libreoffice-l10n-dz libreoffice-l10n-el libreoffice-l10n-en_GB libreoffice-l10n-es libreoffice-l10n-et libreoffice-l10n-eu libreoffice-l10n-fa libreoffice-l10n-fi libreoffice-l10n-fr libreoffice-l10n-ga libreoffice-l10n-gl libreoffice-l10n-gu libreoffice-l10n-he libreoffice-l10n-hi libreoffice-l10n-hr libreoffice-l10n-hu libreoffice-l10n-it libreoffice-l10n-ja libreoffice-l10n-kn libreoffice-l10n-ko libreoffice-l10n-lt libreoffice-l10n-lv libreoffice-l10n-mai libreoffice-l10n-mk libreoffice-l10n-ml libreoffice-l10n-mr libreoffice-l10n-nb libreoffice-l10n-nl libreoffice-l10n-nn libreoffice-l10n-nr libreoffice-l10n-nso libreoffice-l10n-or libreoffice-l10n-pa_IN libreoffice-l10n-pl libreoffice-l10n-pt libreoffice-l10n-pt_BR libreoffice-l10n-ro libreoffice-l10n-ru libreoffice-l10n-sh libreoffice-l10n-si libreoffice-l10n-sk libreoffice-l10n-sl libreoffice-l10n-sr libreoffice-l10n-ss libreoffice-l10n-st libreoffice-l10n-sv libreoffice-l10n-ta libreoffice-l10n-te libreoffice-l10n-th libreoffice-l10n-tn libreoffice-l10n-tr libreoffice-l10n-ts libreoffice-l10n-uk libreoffice-l10n-ve libreoffice-l10n-xh libreoffice-l10n-zh_CN libreoffice-l10n-zh_TW libreoffice-l10n-zu libreoffice-math libreoffice-openclipart libreoffice-pdfimport libreoffice-presentation-minimizer libreoffice-presenter-screen libreoffice-pyuno libreoffice-style-crystal libreoffice-style-galaxy libreoffice-style-hicontrast libreoffice-style-oxygen libreoffice-style-tango libreoffice-testtool libreoffice-wiki-publisher libreoffice-writer Update: Sat Apr 21 13:56:02 2012 Importance: security ID: MDVSA-2012:063 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:063 %pre An XML External Entity expansion flaw was found in the way Raptor processed RDF files. If an application linked against Raptor were to open a specially-crafted RDF file, it could possibly allow a remote attacker to obtain a copy of an arbitrary local file that the user running the application had access to. A bug in the way Raptor handled external entities could cause that application to crash or, possibly, execute arbitrary code with the privileges of the user running the application (CVE-2012-0037). libreoffice for Mandriva Linux 2011 has been upgraded to the 3.4.6 version which is not vulnerable to this issue. %description LibreOffice is an Open Source, community-developed, multi-platform office productivity suite. It includes the key desktop applications, such as a word processor, spreadsheet, presentation manager, formula editing and drawing program, with a user interface and feature set similar to other office suites. Sophisticated and flexible, LibreOffice also works transparently with a variety of file formats, including Microsoft Office. %package debugmode initscripts Update: Sun Apr 22 09:37:34 2012 Importance: bugfix ID: MDVA-2012:037 URL: http://www.mandriva.com/security/advisories?name=MDVA-2012:037 %pre In Mandriva 2011 the /etc/rc.d/init.d/functions file contains a typo that causes an error when mounting encrypted partitions at boot time. This advisory resolves this problem. %description The initscripts package contains the basic system scripts used to boot your Mandriva Linux system, change run levels, and shut the system down cleanly. Initscripts also contains the scripts that activate and deactivate most network interfaces. %package lib64mysql18 lib64mysqld0 lib64mysql-devel lib64mysqlservices0 lib64mysql-static-devel mysql mysql-bench mysql-client mysql-common mysql-common-core mysql-core Update: Sun Apr 22 19:52:12 2012 Importance: bugfix ID: MDVA-2012:038 URL: http://www.mandriva.com/security/advisories?name=MDVA-2012:038 %pre This is a maintenance and bugfix release that upgrades mysql to the latest version which resolves various upstream bugs. %description The MySQL(TM) software delivers a very fast, multi-threaded, multi-user, and robust SQL (Structured Query Language) database server. MySQL Server is intended for mission-critical, heavy-load production systems as well as for embedding into mass-deployed software. MySQL is a trademark of MySQL AB. The mysql server is compiled with the following storage engines: - InnoDB Storage Engine - Archive Storage Engine - CSV Storage Engine - Federated Storage Engine - User Defined Functions (UDFs). - Blackhole Storage Engine - Partition Storage Engine - Perfschema Storage Engine %package apache-mod_php lib64php5_common5 php-bcmath php-bz2 php-calendar php-cgi php-cli php-ctype php-curl php-dba php-devel php-doc php-dom php-enchant php-exif php-fileinfo php-filter php-fpm php-ftp php-gd php-gettext php-gmp php-hash php-iconv php-imap php-ini php-intl php-json php-ldap php-mailparse php-mbstring php-mcrypt php-mssql php-mysql php-mysqli php-mysqlnd php-odbc php-openssl php-pcntl php-pdo php-pdo_dblib php-pdo_mysql php-pdo_odbc php-pdo_pgsql php-pdo_sqlite php-pgsql php-phar php-posix php-pspell php-readline php-recode php-session php-shmop php-snmp php-soap php-sockets php-sqlite3 php-sqlite php-ssh2 php-suhosin php-sybase_ct php-sysvmsg php-sysvsem php-sysvshm php-tidy php-timezonedb php-tokenizer php-vld php-wddx php-xdebug php-xml php-xmlreader php-xmlrpc php-xmlwriter php-xsl php-zip php-zlib Update: Fri Apr 27 09:05:36 2012 Importance: security ID: MDVSA-2012:065 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:065 %pre Multiple vulnerabilities has been identified and fixed in php: The PDORow implementation in PHP before 5.3.9 does not properly interact with the session feature, which allows remote attackers to cause a denial of service (application crash) via a crafted application that uses a PDO driver for a fetch and then calls the session_start function, as demonstrated by a crash of the Apache HTTP Server (CVE-2012-0788). Note: this was fixed with php-5.3.10 The php_register_variable_ex function in php_variables.c in PHP 5.3.9 allows remote attackers to execute arbitrary code via a request containing a large number of variables, related to improper handling of array variables. NOTE: this vulnerability exists because of an incorrect fix for CVE-2011-4885 (CVE-2012-0830). Note: this was fixed with php-5.3.10 PHP before 5.3.10 does not properly perform a temporary change to the magic_quotes_gpc directive during the importing of environment variables, which makes it easier for remote attackers to conduct SQL injection attacks via a crafted request, related to main/php_variables.c, sapi/cgi/cgi_main.c, and sapi/fpm/fpm/fpm_main.c (CVE-2012-0831). Insufficient validating of upload name leading to corrupted $_FILES indices (CVE-2012-1172). The updated php packages have been upgraded to 5.3.11 which is not vulnerable to these issues. Stack-based buffer overflow in the suhosin_encrypt_single_cookie function in the transparent cookie-encryption feature in the Suhosin extension before 0.9.33 for PHP, when suhosin.cookie.encrypt and suhosin.multiheader are enabled, might allow remote attackers to execute arbitrary code via a long string that is used in a Set-Cookie HTTP header (CVE-2012-0807). The php-suhosin packages has been upgraded to the 0.9.33 version which is not affected by this issue. Additionally some of the PECL extensions has been upgraded to their latest respective versions which resolves various upstream bugs. %description PHP5 is an HTML-embeddable scripting language. PHP5 offers built-in database integration for several commercial and non-commercial database management systems, so writing a database-enabled script with PHP5 is fairly simple. The most common use of PHP5 coding is probably as a replacement for CGI scripts. This version of php has the suhosin patch 0.9.10 applied. Please report bugs here: http://qa.mandriva.com/ so that the official maintainer of this Mandriva package can help you. More information regarding the suhosin patch 0.9.10 here: http://www.suhosin.org/ %package firefox firefox-af firefox-ar firefox-ast firefox-be firefox-bg firefox-bn_BD firefox-bn_IN firefox-br firefox-bs firefox-ca firefox-cs firefox-cy firefox-da firefox-de firefox-devel firefox-el firefox-en_GB firefox-en_ZA firefox-eo firefox-es_AR firefox-es_CL firefox-es_ES firefox-es_MX firefox-et firefox-eu firefox-fa firefox-fi firefox-fr firefox-fy firefox-ga_IE firefox-gd firefox-gl firefox-gu_IN firefox-he firefox-hi firefox-hr firefox-hu firefox-hy firefox-id firefox-is firefox-it firefox-ja firefox-kk firefox-kn firefox-ko firefox-ku firefox-lg firefox-lt firefox-lv firefox-mai firefox-mk firefox-ml firefox-mr firefox-nb_NO firefox-nl firefox-nn_NO firefox-nso firefox-or firefox-pa_IN firefox-pl firefox-pt_BR firefox-pt_PT firefox-ro firefox-ru firefox-si firefox-sk firefox-sl firefox-sq firefox-sr firefox-sv_SE firefox-ta firefox-ta_LK firefox-te firefox-th firefox-tr firefox-uk firefox-vi firefox-zh_CN firefox-zh_TW firefox-zu lib64cairo2 lib64cairo-devel lib64cairo-static-devel lib64sqlite3_0 lib64sqlite3-devel lib64sqlite3-static-devel lib64xulrunner12.0 lib64xulrunner-devel mozilla-thunderbird mozilla-thunderbird-ar mozilla-thunderbird-be mozilla-thunderbird-bg mozilla-thunderbird-bn_BD mozilla-thunderbird-br mozilla-thunderbird-ca mozilla-thunderbird-cs mozilla-thunderbird-da mozilla-thunderbird-de mozilla-thunderbird-el mozilla-thunderbird-en_GB mozilla-thunderbird-enigmail mozilla-thunderbird-enigmail-ar mozilla-thunderbird-enigmail-ca mozilla-thunderbird-enigmail-cs mozilla-thunderbird-enigmail-de mozilla-thunderbird-enigmail-el mozilla-thunderbird-enigmail-es mozilla-thunderbird-enigmail-fi mozilla-thunderbird-enigmail-fr mozilla-thunderbird-enigmail-it mozilla-thunderbird-enigmail-ja mozilla-thunderbird-enigmail-ko mozilla-thunderbird-enigmail-nb mozilla-thunderbird-enigmail-nl mozilla-thunderbird-enigmail-pl mozilla-thunderbird-enigmail-pt mozilla-thunderbird-enigmail-pt_BR mozilla-thunderbird-enigmail-ru mozilla-thunderbird-enigmail-sl mozilla-thunderbird-enigmail-sv mozilla-thunderbird-enigmail-tr mozilla-thunderbird-enigmail-vi mozilla-thunderbird-enigmail-zh_CN mozilla-thunderbird-enigmail-zh_TW mozilla-thunderbird-es_AR mozilla-thunderbird-es_ES mozilla-thunderbird-et mozilla-thunderbird-eu mozilla-thunderbird-fi mozilla-thunderbird-fr mozilla-thunderbird-fy mozilla-thunderbird-ga mozilla-thunderbird-gd mozilla-thunderbird-gl mozilla-thunderbird-he mozilla-thunderbird-hu mozilla-thunderbird-id mozilla-thunderbird-is mozilla-thunderbird-it mozilla-thunderbird-ja mozilla-thunderbird-ko mozilla-thunderbird-lightning mozilla-thunderbird-lt mozilla-thunderbird-nb_NO mozilla-thunderbird-nl mozilla-thunderbird-nn_NO mozilla-thunderbird-pl mozilla-thunderbird-pt_BR mozilla-thunderbird-pt_PT mozilla-thunderbird-ro mozilla-thunderbird-ru mozilla-thunderbird-si mozilla-thunderbird-sk mozilla-thunderbird-sl mozilla-thunderbird-sq mozilla-thunderbird-sv_SE mozilla-thunderbird-ta_LK mozilla-thunderbird-tr mozilla-thunderbird-uk mozilla-thunderbird-vi mozilla-thunderbird-zh_CN mozilla-thunderbird-zh_TW nsinstall sqlite3-tools xulrunner Update: Fri Apr 27 10:23:38 2012 Importance: security ID: MDVSA-2012:066 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:066 %pre Security issues were identified and fixed in mozilla firefox and thunderbird: Mozilla developers identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these bugs showed evidence of memory corruption under certain circumstances, and we presume that with enough effort at least some of these could be exploited to run arbitrary code (CVE-2012-0468, CVE-2012-0467). Using the Address Sanitizer tool, security researcher Aki Helin from OUSPG found that IDBKeyRange of indexedDB remains in the XPConnect hashtable instead of being unlinked before being destroyed. When it is destroyed, this causes a use-after-free, which is potentially exploitable (CVE-2012-0469). Using the Address Sanitizer tool, security researcher Atte Kettunen from OUSPG found a heap corruption in gfxImageSurface which allows for invalid frees and possible remote code execution. This happens due to float error, resulting from graphics values being passed through different number systems (CVE-2012-0470). Anne van Kesteren of Opera Software found a multi-octet encoding issue where certain octets will destroy the following octets in the processing of some multibyte character sets. This can leave users vulnerable to cross-site scripting (XSS) attacks on maliciously crafted web pages (CVE-2012-0471). Security research firm iDefense reported that researcher wushi of team509 discovered a memory corruption on Windows Vista and Windows 7 systems with hardware acceleration disabled or using incompatible video drivers. This is created by using cairo-dwrite to attempt to render fonts on an unsupported code path. This corruption causes a potentially exploitable crash on affected systems (CVE-2012-0472). Mozilla community member Matias Juntunen discovered an error in WebGLBuffer where FindMaxElementInSubArray receives wrong template arguments from FindMaxUshortElement. This bug causes maximum index to be computed incorrectly within WebGL.drawElements, allowing the reading of illegal video memory (CVE-2012-0473). Security researchers Jordi Chancel and Eddy Bordi reported that they could short-circuit page loads to show the address of a different site than what is loaded in the window in the addressbar. Security researcher Chris McGowen independently reported the same flaw, and further demonstrated that this could lead to loading scripts from the attacker's site, leaving users vulnerable to cross-site scripting (XSS) attacks (CVE-2012-0474). Security researcher Masato Kinugawa found that during the decoding of ISO-2022-KR and ISO-2022-CN character sets, characters near 1024 bytes are treated incorrectly, either doubling or deleting bytes. On certain pages it might be possible for an attacker to pad the output of the page such that these errors fall in the right place to affect the structure of the page, allowing for cross-site script (XSS) injection (CVE-2012-0477). Mozilla community member Ms2ger found an image rendering issue with WebGL when texImage2D uses use JSVAL_TO_OBJECT on arbitrary objects. This can lead to a crash on a maliciously crafted web page. While there is no evidence that this is directly exploitable, there is a possibility of remote code execution (CVE-2012-0478). Mateusz Jurczyk of the Google Security Team discovered an off-by-one error in the OpenType Sanitizer using the Address Sanitizer tool. This can lead to an out-of-bounds read and execution of an uninitialized function pointer during parsing and possible remote code execution (CVE-2011-3062). Security researcher Jeroen van der Gun reported that if RSS or Atom XML invalid content is loaded over HTTPS, the addressbar updates to display the new location of the loaded resource, including SSL indicators, while the main window still displays the previously loaded content. This allows for phishing attacks where a malicious page can spoof the identify of another seemingly secure site (CVE-2012-0479). The mozilla firefox and thunderbird packages has been upgraded to the latest respective versions which is unaffected by these security flaws. Additionally the SQLite packages has been upgraded to the 3.7.11 version and the cairo packages has been patched to work with firefox and thunderbird 12.0 for Mandriva Linux 2011. %description XULRunner is a Mozilla runtime package that can be used to bootstrap XUL+XPCOM applications that are as rich as Firefox and Thunderbird. It will provide mechanisms for installing, upgrading, and uninstalling these applications. XULRunner will also provide libxul, a solution which allows the embedding of Mozilla technologies in other projects and products. %package lib64netapi0 lib64netapi-devel lib64smbclient0 lib64smbclient0-devel lib64smbclient0-static-devel lib64smbsharemodes0 lib64smbsharemodes-devel lib64wbclient0 lib64wbclient-devel mount-cifs nss_wins samba-client samba-common samba-doc samba-domainjoin-gui samba-server samba-swat samba-winbind Update: Tue May 01 09:43:14 2012 Importance: security ID: MDVSA-2012:067 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:067 %pre A vulnerability has been found and corrected in samba: Security checks were incorrectly applied to the Local Security Authority (LSA) remote proceedure calls (RPC) CreateAccount, OpenAccount, AddAccountRights and RemoveAccountRights allowing any authenticated user to modify the privileges database (CVE-2012-2111). The updated packages have been patched to correct this issue. %description Samba provides an SMB server which can be used to provide network services to SMB (sometimes called "Lan Manager") clients, including various versions of MS Windows, OS/2, and other Linux machines. Samba also provides some SMB clients, which complement the built-in SMB filesystem in Linux. Samba uses NetBIOS over TCP/IP (NetBT) protocols and does NOT need NetBEUI (Microsoft Raw NetBIOS frame) protocol. Samba-3.0 features working NT Domain Control capability and includes the SWAT (Samba Web Administration Tool) that allows samba's smb.conf file to be remotely managed using your favourite web browser. For the time being this is being enabled on TCP port 901 via xinetd. SWAT is now included in it's own subpackage, samba-swat. Please refer to the WHATSNEW.txt document for fixup information. This binary release includes encrypted password support. Please read the smb.conf file and ENCRYPTION.txt in the docs directory for implementation details. %package gcc gcc-c++ gcc-cpp gcc-gfortran gcc-gnat gcc-go gcc-java gcc-objc gcc-objc++ gcc-plugin-devel lib64ffi4 lib64ffi-devel lib64ffi-static-devel lib64gcc1 lib64gcj12 lib64gcj-devel lib64gcj-static-devel lib64gfortran3 lib64gfortran-devel lib64gfortran-static-devel lib64gnat1 lib64gnat-devel lib64gnat-static-devel lib64go0 lib64go-devel lib64gomp1 lib64gomp-devel lib64gomp-static-devel lib64go-static-devel lib64mudflap0 lib64mudflap-devel lib64mudflap-static-devel lib64objc3 lib64objc-devel lib64objc-static-devel lib64quadmath0 lib64quadmath-devel lib64quadmath-static-devel lib64stdc++6 lib64stdc++-devel lib64stdc++-static-devel libgcj12-src Update: Thu May 03 11:48:47 2012 Importance: bugfix ID: MDVA-2012:040 URL: http://www.mandriva.com/security/advisories?name=MDVA-2012:040 %pre The GCC package in Mandriva 2011 LTS is affected by a problem that prevents it from backporting a specific package from Cooker, as the default build options cause an ICE (Internal Compiler Error) when generating debug information and compiling with additional optimizations. This update corrects the problem. %description The gcc package contains the GNU Compiler Collection version 4.6. %package lib64php5_common5 php-bcmath php-bz2 php-calendar php-cgi php-cli php-ctype php-curl php-dba php-devel php-doc php-dom php-enchant php-exif php-fileinfo php-filter php-fpm php-ftp php-gd php-gettext php-gmp php-hash php-iconv php-imap php-intl php-json php-ldap php-mbstring php-mcrypt php-mssql php-mysql php-mysqli php-mysqlnd php-odbc php-openssl php-pcntl php-pdo php-pdo_dblib php-pdo_mysql php-pdo_odbc php-pdo_pgsql php-pdo_sqlite php-pgsql php-phar php-posix php-pspell php-readline php-recode php-session php-shmop php-snmp php-soap php-sockets php-sqlite3 php-sqlite php-sybase_ct php-sysvmsg php-sysvsem php-sysvshm php-tidy php-tokenizer php-wddx php-xml php-xmlreader php-xmlrpc php-xmlwriter php-xsl php-zip php-zlib Update: Fri May 04 10:23:40 2012 Importance: security ID: MDVSA-2012:068 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:068 %pre A vulnerability has been found and corrected in php(-cgi): PHP-CGI-based setups contain a vulnerability when parsing query string parameters from php files. A remote unauthenticated attacker could obtain sensitive information, cause a denial of service condition or may be able to execute arbitrary code with the privileges of the web server (CVE-2012-1823). The updated packages have been patched to correct this issue. %description PHP5 is an HTML-embeddable scripting language. PHP5 offers built-in database integration for several commercial and non-commercial database management systems, so writing a database-enabled script with PHP5 is fairly simple. The most common use of PHP5 coding is probably as a replacement for CGI scripts. This version of php has the suhosin patch 0.9.10 applied. Please report bugs here: http://qa.mandriva.com/ so that the official maintainer of this Mandriva package can help you. More information regarding the suhosin patch 0.9.10 here: http://www.suhosin.org/ %package cifs-utils Update: Fri May 04 14:59:08 2012 Importance: security ID: MDVSA-2012:069 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:069 %pre A vulnerability has been found and corrected in cifs-utils: A file existence dislosure flaw was found in the way mount.cifs tool of the Samba SMB/CIFS tools suite performed mount of a Linux CIFS (Common Internet File System) filesystem. A local user, able to mount a remote CIFS share / target to a local directory could use this flaw to confirm (non) existence of a file system object (file, directory or process descriptor) via error messages generated during the mount.cifs tool run (CVE-2012-1586). The updated packages have been patched to correct this issue. %description Tools for Managing Linux CIFS Client Filesystems. %package apache-mod_php lib64php5_common5 php-bcmath php-bz2 php-calendar php-cgi php-cli php-ctype php-curl php-dba php-devel php-doc php-dom php-enchant php-exif php-fileinfo php-filter php-fpm php-ftp php-gd php-gettext php-gmp php-hash php-iconv php-imap php-ini php-intl php-json php-ldap php-mbstring php-mcrypt php-mssql php-mysql php-mysqli php-mysqlnd php-odbc php-openssl php-pcntl php-pdo php-pdo_dblib php-pdo_mysql php-pdo_odbc php-pdo_pgsql php-pdo_sqlite php-pgsql php-phar php-posix php-pspell php-readline php-recode php-session php-shmop php-snmp php-soap php-sockets php-sqlite3 php-sqlite php-sybase_ct php-sysvmsg php-sysvsem php-sysvshm php-tidy php-tokenizer php-wddx php-xml php-xmlreader php-xmlrpc php-xmlwriter php-xsl php-zip php-zlib Update: Thu May 10 11:08:16 2012 Importance: security ID: MDVSA-2012:068-1 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:068-1 %pre A vulnerability has been found and corrected in php(-cgi): PHP-CGI-based setups contain a vulnerability when parsing query string parameters from php files. A remote unauthenticated attacker could obtain sensitive information, cause a denial of service condition or may be able to execute arbitrary code with the privileges of the web server (CVE-2012-1823). The updated packages have been patched to correct this issue. Update: It was discovered that the previous fix for the CVE-2012-1823 vulnerability was incomplete (CVE-2012-2335, CVE-2012-2336). The updated packages provides the latest version (5.3.13) which provides a solution to this flaw. %description PHP5 is an HTML-embeddable scripting language. PHP5 offers built-in database integration for several commercial and non-commercial database management systems, so writing a database-enabled script with PHP5 is fairly simple. The most common use of PHP5 coding is probably as a replacement for CGI scripts. This version of php has the suhosin patch 0.9.10 applied. Please report bugs here: http://qa.mandriva.com/ so that the official maintainer of this Mandriva package can help you. More information regarding the suhosin patch 0.9.10 here: http://www.suhosin.org/ %package lib64openssl1.0.0 lib64openssl-devel lib64openssl-engines1.0.0 lib64openssl-static-devel openssl Update: Fri May 11 12:17:10 2012 Importance: security ID: MDVSA-2012:073 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:073 %pre A vulnerability has been found and corrected in openssl: A flaw in the OpenSSL handling of CBC mode ciphersuites in DTLS can be exploited in a denial of service attack on both clients and servers (CVE-2012-2333). The updated packages have been patched to correct this issue. %description The openssl certificate management tool and the shared libraries that provide various encryption and decription algorithms and protocols, including DES, RC4, RSA and SSL. %package lib64mysql18 lib64mysqld0 lib64mysql-devel lib64mysqlservices0 lib64mysql-static-devel mysql mysql-bench mysql-client mysql-common mysql-common-core mysql-core Update: Sun May 13 14:27:16 2012 Importance: bugfix ID: MDVA-2012:041 URL: http://www.mandriva.com/security/advisories?name=MDVA-2012:041 %pre This is a maintenance and bugfix release that upgrades mysql to the latest version which resolves various upstream bugs. %description The MySQL(TM) software delivers a very fast, multi-threaded, multi-user, and robust SQL (Structured Query Language) database server. MySQL Server is intended for mission-critical, heavy-load production systems as well as for embedding into mass-deployed software. MySQL is a trademark of MySQL AB. The mysql server is compiled with the following storage engines: - InnoDB Storage Engine - Archive Storage Engine - CSV Storage Engine - Federated Storage Engine - User Defined Functions (UDFs). - Blackhole Storage Engine - Partition Storage Engine - Perfschema Storage Engine %package ffmpeg lib64avfilter1 lib64avformats52 lib64avutil50 lib64ffmpeg52 lib64ffmpeg-devel lib64ffmpeg-static-devel lib64postproc51 lib64swscaler0 Update: Tue May 15 12:22:54 2012 Importance: security ID: MDVSA-2012:076 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:076 %pre Multiple vulnerabilities has been found and corrected in ffmpeg: The Matroska format decoder in FFmpeg does not properly allocate memory, which allows remote attackers to execute arbitrary code via a crafted file (CVE-2011-3362, CVE-2011-3504). cavsdec.c in libavcodec in FFmpeg allows remote attackers to cause a denial of service (incorrect write operation and application crash) via an invalid bitstream in a Chinese AVS video (aka CAVS) file, related to the decode_residual_block, check_for_slice, and cavs_decode_frame functions, a different vulnerability than CVE-2011-3362 (CVE-2011-3973). Integer signedness error in the decode_residual_inter function in cavsdec.c in libavcodec in FFmpeg allows remote attackers to cause a denial of service (incorrect write operation and application crash) via an invalid bitstream in a Chinese AVS video (aka CAVS) file, a different vulnerability than CVE-2011-3362 (CVE-2011-3974). Double free vulnerability in the Theora decoder in FFmpeg allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted stream (CVE-2011-3892). FFmpeg does not properly implement the MKV and Vorbis media handlers, which allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors (CVE-2011-3893). Heap-based buffer overflow in the Vorbis decoder in FFmpeg allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted stream (CVE-2011-3895). An error within the QDM2 decoder (libavcodec/qdm2.c) can be exploited to cause a buffer overflow (CVE-2011-4351). An integer overflow error within the "vp3_dequant()" function (libavcodec/vp3.c) can be exploited to cause a buffer overflow (CVE-2011-4352). Errors within the "av_image_fill_pointers()", the "vp5_parse_coeff()", and the "vp6_parse_coeff()" functions can be exploited to trigger out-of-bounds reads (CVE-2011-4353). It was discovered that Libav incorrectly handled certain malformed VMD files. If a user were tricked into opening a crafted VMD file, an attacker could cause a denial of service via application crash, or possibly execute arbitrary code with the privileges of the user invoking the program (CVE-2011-4364). It was discovered that Libav incorrectly handled certain malformed SVQ1 streams. If a user were tricked into opening a crafted SVQ1 stream file, an attacker could cause a denial of service via application crash, or possibly execute arbitrary code with the privileges of the user invoking the program (CVE-2011-4579). Multiple input validations in the decoders/ demuxers for Westwood Studios VQA, Apple MJPEG-B, Theora, Matroska, Vorbis, Sony ATRAC3, DV, NSV, files could lead to the execution of arbitrary code (CVE-2011-3929, CVE-2011-3936, CVE-2011-3937, CVE-2011-3940, CVE-2011-3945, CVE-2011-3947, CVE-2012-0853, CVE-2012-0858). The updated packages have been upgraded to the 0.7.12 version where these issues has been corrected. %description ffmpeg is a hyper fast realtime audio/video encoder, a streaming server and a generic audio and video file converter. It can grab from a standard Video4Linux video source and convert it into several file formats based on DCT/motion compensation encoding. Sound is compressed in MPEG audio layer 2 or using an AC3 compatible stream. %package imagemagick imagemagick-desktop imagemagick-doc lib64magick4 lib64magick-devel perl-Image-Magick Update: Thu May 17 12:40:32 2012 Importance: security ID: MDVSA-2012:078 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:078 %pre Multiple vulnerabilities has been found and corrected in imagemagick: A flaw was found in the way ImageMagick processed images with malformed Exchangeable image file format (Exif) metadata. An attacker could create a specially-crafted image file that, when opened by a victim, would cause ImageMagick to crash or, potentially, execute arbitrary code (CVE-2012-0247). A denial of service flaw was found in the way ImageMagick processed images with malformed Exif metadata. An attacker could create a specially-crafted image file that, when opened by a victim, could cause ImageMagick to enter an infinite loop (CVE-2012-0248). The original fix for CVE-2012-0247 failed to check for the possibility of an integer overflow when computing the sum of number_bytes and offset. This resulted in a wrap around into a value smaller than length, making original CVE-2012-0247 introduced length check still to be possible to bypass, leading to memory corruption (CVE-2012-1185). An integer overflow flaw was found in the way ImageMagick processed certain Exif tags with a large components count. An attacker could create a specially-crafted image file that, when opened by a victim, could cause ImageMagick to access invalid memory and crash (CVE-2012-0259). A denial of service flaw was found in the way ImageMagick decoded certain JPEG images. A remote attacker could provide a JPEG image with specially-crafted sequences of RST0 up to RST7 restart markers (used to indicate the input stream to be corrupted), which once processed by ImageMagick, would cause it to consume excessive amounts of memory and CPU time (CVE-2012-0260). An out-of-bounds buffer read flaw was found in the way ImageMagick processed certain TIFF image files. A remote attacker could provide a TIFF image with a specially-crafted Exif IFD value (the set of tags for recording Exif-specific attribute information), which once opened by ImageMagick, would cause it to crash (CVE-2012-1798). The updated packages have been patched to correct these issues. %description ImageMagick is a powerful image display, conversion and manipulation tool. It runs in an X session. With this tool, you can view, edit and display a variety of image formats. ImageMagick can make use of the following delegate programs, available as packages in Mandriva Linux: curl enscript ffmpeg ghostscript ghostscript-X gimp gnuplot graphviz html2ps mplayer ncompress netpbm sane-backends tetex-dvips transfig ufraw xdg-utils zip autotrace povray %package sudo Update: Mon May 21 14:49:57 2012 Importance: security ID: MDVSA-2012:079 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:079 %pre A vulnerability has been found and corrected in sudo: A flaw exists in the IP network matching code in sudo versions 1.6.9p3 through 1.8.4p4 that may result in the local host being matched even though it is not actually part of the network described by the IP address and associated netmask listed in the sudoers file or in LDAP. As a result, users authorized to run commands on certain IP networks may be able to run commands on hosts that belong to other networks not explicitly listed in sudoers (CVE-2012-2337 The updated packages have been patched to correct this issue. %description Sudo is a program designed to allow a sysadmin to give limited root privileges to users and log root activity. The basic philosophy is to give as few privileges as possible but still allow people to get their work done. %package dumpcap lib64wireshark1 lib64wireshark-devel rawshark tshark wireshark wireshark-tools Update: Wed May 23 13:50:01 2012 Importance: security ID: MDVSA-2012:080 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:080 %pre Multiple vulnerabilities was found and corrected in Wireshark: It may be possible to make Wireshark hang for long or indefinite periods by injecting a malformed packet onto the wire or by convincing someone to read a malformed packet trace file. It may be possible to make Wireshark crash by injecting a malformed packet onto the wire or by convincing someone to read a malformed packet trace file. This advisory provides the latest version of Wireshark (1.6.8) which is not vulnerable to these issues. %description Wireshark is a network traffic analyzer for Unix-ish operating systems. It is based on GTK+, a graphical user interface library, and libpcap, a packet capture and filtering library. Wireshark is a fork of Ethereal(tm) %package timezone timezone-java Update: Thu May 24 09:09:37 2012 Importance: bugfix ID: MDVA-2012:044 URL: http://www.mandriva.com/security/advisories?name=MDVA-2012:044 %pre Timezone is a package that contains data files with rules for various timezones around the world. This update addresses the following changes: - Fiji adopts DST for 2011 (effective Oct 23rd, 2011) - West Bank changes date for DST end in 2011 to Sep 30th - Fix DST for: Pridnestrovian Moldavian Republic, Ukraine, Bahia and Brazil. - Haiti observes DST from 2012 on - Gaza Strip and Hebron observe DST in 2012 - Change start of DST in Syria to last Friday in March - Morocco moved DST entry to last Sunday of April - Changes to zones for Antarctica stations - Armenia abolished DST in 2012 and forward - Cuba enters DST on 31st March - Falkland Islands will stay on permanent Summer Time - New zone for Creston Valley, Canada, which differs from Dawson Creek in past stamps. Changes to historical stamps in Canada. - Last year, Tokelau skipped over the date line together with Samoa - The Chilean Government has decided to postpone the entrance into winter time (to leave DST) from March 11 2012 to April 28th 2012 - Cuba postponed DST by two weeks to Nov 13 - Fiji will enter DST on Jan 21 %description This package contains data files with rules for various timezones around the world. %package finch lib64finch0 lib64purple0 lib64purple-devel pidgin pidgin-bonjour pidgin-client pidgin-gevolution pidgin-i18n pidgin-meanwhile pidgin-perl pidgin-plugins pidgin-silc pidgin-tcl Update: Mon May 28 15:54:38 2012 Importance: security ID: MDVSA-2012:082 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:082 %pre Multiple vulnerabilities has been discovered and corrected in pidgin: A series of specially crafted file transfer requests can cause clients to reference invalid memory. The user must have accepted one of the file transfer requests (CVE-2012-2214). Incoming messages with certain characters or character encodings can cause clients to crash (CVE-2012-2318). This update provides pidgin 2.10.4, which is not vulnerable to these issues. %description Pidgin allows you to talk to anyone using a variety of messaging protocols including AIM, MSN, Yahoo!, Jabber, Bonjour, Gadu-Gadu, ICQ, IRC, Novell Groupwise, QQ, Lotus Sametime, SILC, Simple and Zephyr. These protocols are implemented using a modular, easy to use design. To use a protocol, just add an account using the account editor. Pidgin supports many common features of other clients, as well as many unique features, such as perl scripting, TCL scripting and C plugins. Pidgin is not affiliated with or endorsed by America Online, Inc., Microsoft Corporation, Yahoo! Inc., or ICQ Inc. %package lib64blkid1 lib64blkid-devel lib64mount1 lib64mount-devel lib64uuid1 lib64uuid-devel util-linux uuidd Update: Tue May 29 11:50:01 2012 Importance: security ID: MDVSA-2012:083 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:083 %pre Multiple vulnerabilities has been discovered and corrected in util-linux: mount in util-linux 2.19 and earlier attempts to append to the /etc/mtab.tmp file without first checking whether resource limits would interfere, which allows local users to trigger corruption of the /etc/mtab file via a process with a small RLIMIT_FSIZE value, a related issue to CVE-2011-1089 (CVE-2011-1675). mount in util-linux 2.19 and earlier does not remove the /etc/mtab~ lock file after a failed attempt to add a mount entry, which has unspecified impact and local attack vectors (CVE-2011-1677). The updated packages have been patched to correct this issue. %description The util-linux-ng package contains a large variety of low-level system utilities that are necessary for a Linux system to function. Among others, Util-linux-ng contains the fdisk configuration tool and the login program. %package ipxutils lib64ncpfs2.3 lib64ncpfs-devel ncpfs Update: Tue May 29 13:00:35 2012 Importance: security ID: MDVSA-2012:084 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:084 %pre Multiple vulnerabilities has been discovered and corrected in ncpfs: ncpfs 2.2.6 and earlier attempts to use (1) ncpmount to append to the /etc/mtab file and (2) ncpumount to append to the /etc/mtab.tmp file without first checking whether resource limits would interfere, which allows local users to trigger corruption of the /etc/mtab file via a process with a small RLIMIT_FSIZE value, a related issue to CVE-2011-1089 (CVE-2011-1679). ncpmount in ncpfs 2.2.6 and earlier does not remove the /etc/mtab~ lock file after a failed attempt to add a mount entry, which has unspecified impact and local attack vectors (CVE-2011-1680). The updated packages have been patched to correct this issue. %description Ncpfs is a filesystem which understands the Novell NetWare(TM) NCP protocol. Functionally, NCP is used for NetWare the way NFS is used in the TCP/IP world. For a Linux system to mount a NetWare filesystem, it needs a special mount program. The ncpfs package contains such a mount program plus other tools for configuring and using the ncpfs filesystem. Install the ncpfs package if you need to use the ncpfs filesystem to use Novell NetWare files or services. %package lib64upsclient1 nut nut-cgi nut-devel nut-drivers-hal nut-server Update: Tue Jun 05 08:29:43 2012 Importance: security ID: MDVSA-2012:087 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:087 %pre A vulnerability has been discovered and corrected in nut: NUT server (upsd), from versions 2.4.0 to 2.6.3, are exposed to crashes when receiving random data from the network (CVE-2012-2944). The updated packages have been patched to correct this issue. %description These programs are part of a developing project to monitor the assortment of UPSes that are found out there in the field. Many models have serial ports of some kind that allow some form of state checking. This capability has been harnessed where possible to allow for safe shutdowns, live status tracking on web pages, and more. This package includes the client utilities that are required to monitor a UPS that the client host is powered from - either connected directly via a serial port (in which case the nut-server package needs to be installed on this machine) or across the network (where another host on the network monitors the UPS via serial cable and runs the main nut package to allow clients to see the information). %package lib64upsclient1 nut nut-cgi nut-devel nut-drivers-hal nut-server Update: Tue Jun 05 08:31:20 2012 Importance: security ID: MDVSA-2012:087 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:087 %pre A vulnerability has been discovered and corrected in nut: Buffer overflow in the addchar function in common/parseconf.c in upsd in Network UPS Tools (NUT) before 2.6.4 allows remote attackers to execute arbitrary code or cause a denial of service (electric-power outage) via a long string containing non-printable characters (CVE-2012-2944). The updated packages have been patched to correct this issue. %description These programs are part of a developing project to monitor the assortment of UPSes that are found out there in the field. Many models have serial ports of some kind that allow some form of state checking. This capability has been harnessed where possible to allow for safe shutdowns, live status tracking on web pages, and more. This package includes the client utilities that are required to monitor a UPS that the client host is powered from - either connected directly via a serial port (in which case the nut-server package needs to be installed on this machine) or across the network (where another host on the network monitors the UPS via serial cable and runs the main nut package to allow clients to see the information). %package firefox firefox-af firefox-ar firefox-ast firefox-be firefox-bg firefox-bn_BD firefox-bn_IN firefox-br firefox-bs firefox-ca firefox-cs firefox-cy firefox-da firefox-de firefox-devel firefox-el firefox-en_GB firefox-en_ZA firefox-eo firefox-es_AR firefox-es_CL firefox-es_ES firefox-es_MX firefox-et firefox-eu firefox-fa firefox-fi firefox-fr firefox-fy firefox-ga_IE firefox-gd firefox-gl firefox-gu_IN firefox-he firefox-hi firefox-hr firefox-hu firefox-hy firefox-id firefox-is firefox-it firefox-ja firefox-kk firefox-kn firefox-ko firefox-ku firefox-lg firefox-lt firefox-lv firefox-mai firefox-mk firefox-ml firefox-mr firefox-nb_NO firefox-nl firefox-nn_NO firefox-nso firefox-or firefox-pa_IN firefox-pl firefox-pt_BR firefox-pt_PT firefox-ro firefox-ru firefox-si firefox-sk firefox-sl firefox-sq firefox-sr firefox-sv_SE firefox-ta firefox-ta_LK firefox-te firefox-th firefox-tr firefox-uk firefox-vi firefox-zh_CN firefox-zh_TW firefox-zu icedtea-web icedtea-web-javadoc lib64nspr4 lib64nspr-devel lib64nss3 lib64nss-devel lib64nss-static-devel lib64xulrunner13.0 lib64xulrunner-devel mozilla-thunderbird mozilla-thunderbird-ar mozilla-thunderbird-be mozilla-thunderbird-bg mozilla-thunderbird-bn_BD mozilla-thunderbird-br mozilla-thunderbird-ca mozilla-thunderbird-cs mozilla-thunderbird-da mozilla-thunderbird-de mozilla-thunderbird-el mozilla-thunderbird-en_GB mozilla-thunderbird-enigmail mozilla-thunderbird-enigmail-ar mozilla-thunderbird-enigmail-ca mozilla-thunderbird-enigmail-cs mozilla-thunderbird-enigmail-de mozilla-thunderbird-enigmail-el mozilla-thunderbird-enigmail-es mozilla-thunderbird-enigmail-fi mozilla-thunderbird-enigmail-fr mozilla-thunderbird-enigmail-it mozilla-thunderbird-enigmail-ja mozilla-thunderbird-enigmail-ko mozilla-thunderbird-enigmail-nb mozilla-thunderbird-enigmail-nl mozilla-thunderbird-enigmail-pl mozilla-thunderbird-enigmail-pt mozilla-thunderbird-enigmail-pt_BR mozilla-thunderbird-enigmail-ru mozilla-thunderbird-enigmail-sl mozilla-thunderbird-enigmail-sv mozilla-thunderbird-enigmail-tr mozilla-thunderbird-enigmail-vi mozilla-thunderbird-enigmail-zh_CN mozilla-thunderbird-enigmail-zh_TW mozilla-thunderbird-es_AR mozilla-thunderbird-es_ES mozilla-thunderbird-et mozilla-thunderbird-eu mozilla-thunderbird-fi mozilla-thunderbird-fr mozilla-thunderbird-fy mozilla-thunderbird-ga mozilla-thunderbird-gd mozilla-thunderbird-gl mozilla-thunderbird-he mozilla-thunderbird-hu mozilla-thunderbird-id mozilla-thunderbird-is mozilla-thunderbird-it mozilla-thunderbird-ja mozilla-thunderbird-ko mozilla-thunderbird-lightning mozilla-thunderbird-lt mozilla-thunderbird-nb_NO mozilla-thunderbird-nl mozilla-thunderbird-nn_NO mozilla-thunderbird-pl mozilla-thunderbird-pt_BR mozilla-thunderbird-pt_PT mozilla-thunderbird-ro mozilla-thunderbird-ru mozilla-thunderbird-si mozilla-thunderbird-sk mozilla-thunderbird-sl mozilla-thunderbird-sq mozilla-thunderbird-sv_SE mozilla-thunderbird-ta_LK mozilla-thunderbird-tr mozilla-thunderbird-uk mozilla-thunderbird-vi mozilla-thunderbird-zh_CN mozilla-thunderbird-zh_TW nsinstall nss xulrunner Update: Sat Jun 09 16:42:06 2012 Importance: security ID: MDVSA-2012:088 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:088 %pre Security issues were identified and fixed in mozilla firefox and thunderbird: Heap-based buffer overflow in the utf16_to_isolatin1 function in Mozilla Firefox 4.x through 12.0, Firefox ESR 10.x before 10.0.5, Thunderbird 5.0 through 12.0, Thunderbird ESR 10.x before 10.0.5, and SeaMonkey before 2.10 allows remote attackers to execute arbitrary code via vectors that trigger a character-set conversion failure (CVE-2012-1947) Use-after-free vulnerability in the nsFrameList::FirstChild function in Mozilla Firefox 4.x through 12.0, Firefox ESR 10.x before 10.0.5, Thunderbird 5.0 through 12.0, Thunderbird ESR 10.x before 10.0.5, and SeaMonkey before 2.10 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption and application crash) by changing the size of a container of absolutely positioned elements in a column (CVE-2012-1940). Heap-based buffer overflow in the nsHTMLReflowState::CalculateHypotheticalBox function in Mozilla Firefox 4.x through 12.0, Firefox ESR 10.x before 10.0.5, Thunderbird 5.0 through 12.0, Thunderbird ESR 10.x before 10.0.5, and SeaMonkey before 2.10 allows remote attackers to execute arbitrary code by resizing a window displaying absolutely positioned and relatively positioned elements in nested columns (CVE-2012-1941). Use-after-free vulnerability in the nsINode::ReplaceOrInsertBefore function in Mozilla Firefox 4.x through 12.0, Firefox ESR 10.x before 10.0.5, Thunderbird 5.0 through 12.0, Thunderbird ESR 10.x before 10.0.5, and SeaMonkey before 2.10 might allow remote attackers to execute arbitrary code via document changes involving replacement or insertion of a node (CVE-2012-1946). Mozilla Firefox 4.x through 12.0, Firefox ESR 10.x before 10.0.5, Thunderbird 5.0 through 12.0, Thunderbird ESR 10.x before 10.0.5, and SeaMonkey before 2.10 allow local users to obtain sensitive information via an HTML document that loads a shortcut (aka .lnk) file for display within an IFRAME element, as demonstrated by a network share implemented by (1) Microsoft Windows or (2) Samba (CVE-2012-1945). The Content Security Policy (CSP) implementation in Mozilla Firefox 4.x through 12.0, Firefox ESR 10.x before 10.0.5, Thunderbird 5.0 through 12.0, Thunderbird ESR 10.x before 10.0.5, and SeaMonkey before 2.10 does not block inline event handlers, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via a crafted HTML document (CVE-2012-1944). Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 13.0, Thunderbird before 13.0, and SeaMonkey before 2.10 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to (1) methodjit/ImmutableSync.cpp, (2) the JSObject::makeDenseArraySlow function in js/src/jsarray.cpp, and unknown other components (CVE-2012-1938). jsinfer.cpp in Mozilla Firefox ESR 10.x before 10.0.5 and Thunderbird ESR 10.x before 10.0.5 does not properly determine data types, which allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via crafted JavaScript code (CVE-2012-1939). Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox 4.x through 12.0, Firefox ESR 10.x before 10.0.5, Thunderbird 5.0 through 12.0, Thunderbird ESR 10.x before 10.0.5, and SeaMonkey before 2.10 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors (CVE-2012-1937). Ken Russell of Google reported a bug in NVIDIA graphics drivers that they needed to work around in the Chromium WebGL implementation. Mozilla has done the same in Firefox 13 and ESR 10.0.5 (CVE-2011-3101). The ASN.1 decoder in the QuickDER decoder in Mozilla Network Security Services (NSS) before 3.13.4, as used in Firefox 4.x through 12.0, Firefox ESR 10.x before 10.0.5, Thunderbird 5.0 through 12.0, Thunderbird ESR 10.x before 10.0.5, and SeaMonkey before 2.10, allows remote attackers to cause a denial of service (application crash) via a zero-length item, as demonstrated by (1) a zero-length basic constraint or (2) a zero-length field in an OCSP response (CVE-2012-0441). NOTE: This flaw was addressed earlier with the MDVA-2012:036 advisory. The mozilla firefox and thunderbird packages has been upgraded to the latest respective versions which is unaffected by these security flaws. Additionally the NSPR and the NSS packages has been upgraded to the latest versions which resolves various upstream bugs. %description XULRunner is a Mozilla runtime package that can be used to bootstrap XUL+XPCOM applications that are as rich as Firefox and Thunderbird. It will provide mechanisms for installing, upgrading, and uninstalling these applications. XULRunner will also provide libxul, a solution which allows the embedding of Mozilla technologies in other projects and products. %package bind bind-devel bind-doc bind-utils Update: Sun Jun 10 10:20:33 2012 Importance: security ID: MDVSA-2012:089 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:089 %pre A vulnerability was discovered and corrected in bind: ISC BIND 9.x before 9.7.6-P1, 9.8.x before 9.8.3-P1, 9.9.x before 9.9.1-P1, and 9.4-ESV and 9.6-ESV before 9.6-ESV-R7-P1 does not properly handle resource records with a zero-length RDATA section, which allows remote DNS servers to cause a denial of service (daemon crash or data corruption) or obtain sensitive information from process memory via a crafted record (CVE-2012-1667). The updated packages have been upgraded to bind 9.7.6-P1 and 9.8.3-P1 which is not vulnerable to this issue. %description BIND (Berkeley Internet Name Domain) is an implementation of the DNS (domain Name System) protocols. BIND includes a DNS server (named), which resolves host names to IP addresses, and a resolver library (routines for applications to use when interfacing with DNS). A DNS server allows clients to name resources or objects and share the information with other network machines. The named DNS server can be used on workstations as a caching name server, but is generally only needed on one machine for an entire network. Note that the configuration files for making BIND act as a simple caching nameserver are included in the caching-nameserver package. Install the bind package if you need a DNS server for your network. If you want bind to act a caching name server, you will also need to install the caching-nameserver package. Many BIND 8 features previously unimplemented in BIND 9, including domain-specific forwarding, the \$GENERATE master file directive, and the "blackhole", "dialup", and "sortlist" options Forwarding of dynamic update requests; this is enabled by the "allow-update-forwarding" option A new, simplified database interface and a number of sample drivers based on it; see doc/dev/sdb for details Support for building single-threaded servers for environments that do not supply POSIX threads New configuration options: "min-refresh-time", "max-refresh-time", "min-retry-time", "max-retry-time", "additional-from-auth", "additional-from-cache", "notify explicit" Faster lookups, particularly in large zones. Build Options: --without sdb_ldap Build without ldap simple database support (enabled per default) --with sdb_mysql Build with MySQL database support (disables ldap support, it's either way.) %package libreoffice libreoffice-base libreoffice-calc libreoffice-common libreoffice-core libreoffice-devel libreoffice-devel-doc libreoffice-draw libreoffice-dtd-officedocument1.0 libreoffice-filter-binfilter libreoffice-gnome libreoffice-help-bg libreoffice-help-bn libreoffice-help-bs libreoffice-help-ca libreoffice-help-cs libreoffice-help-da libreoffice-help-de libreoffice-help-dz libreoffice-help-el libreoffice-help-en_GB libreoffice-help-en_US libreoffice-help-es libreoffice-help-et libreoffice-help-eu libreoffice-help-fi libreoffice-help-fr libreoffice-help-gl libreoffice-help-gu libreoffice-help-he libreoffice-help-hi libreoffice-help-hr libreoffice-help-hu libreoffice-help-it libreoffice-help-ja libreoffice-help-ko libreoffice-help-mk libreoffice-help-nb libreoffice-help-nl libreoffice-help-nn libreoffice-help-pl libreoffice-help-pt libreoffice-help-pt_BR libreoffice-help-ru libreoffice-help-si libreoffice-help-sk libreoffice-help-sl libreoffice-help-sv libreoffice-help-tr libreoffice-help-uk libreoffice-help-zh_CN libreoffice-help-zh_TW libreoffice-impress libreoffice-java-common libreoffice-kde4 libreoffice-l10n-af libreoffice-l10n-ar libreoffice-l10n-as libreoffice-l10n-bg libreoffice-l10n-bn libreoffice-l10n-br libreoffice-l10n-bs libreoffice-l10n-ca libreoffice-l10n-cs libreoffice-l10n-cy libreoffice-l10n-da libreoffice-l10n-de libreoffice-l10n-dz libreoffice-l10n-el libreoffice-l10n-en_GB libreoffice-l10n-es libreoffice-l10n-et libreoffice-l10n-eu libreoffice-l10n-fa libreoffice-l10n-fi libreoffice-l10n-fr libreoffice-l10n-ga libreoffice-l10n-gl libreoffice-l10n-gu libreoffice-l10n-he libreoffice-l10n-hi libreoffice-l10n-hr libreoffice-l10n-hu libreoffice-l10n-it libreoffice-l10n-ja libreoffice-l10n-kn libreoffice-l10n-ko libreoffice-l10n-lt libreoffice-l10n-lv libreoffice-l10n-mai libreoffice-l10n-mk libreoffice-l10n-ml libreoffice-l10n-mr libreoffice-l10n-nb libreoffice-l10n-nl libreoffice-l10n-nn libreoffice-l10n-nr libreoffice-l10n-nso libreoffice-l10n-or libreoffice-l10n-pa_IN libreoffice-l10n-pl libreoffice-l10n-pt libreoffice-l10n-pt_BR libreoffice-l10n-ro libreoffice-l10n-ru libreoffice-l10n-sh libreoffice-l10n-si libreoffice-l10n-sk libreoffice-l10n-sl libreoffice-l10n-sr libreoffice-l10n-ss libreoffice-l10n-st libreoffice-l10n-sv libreoffice-l10n-ta libreoffice-l10n-te libreoffice-l10n-th libreoffice-l10n-tn libreoffice-l10n-tr libreoffice-l10n-ts libreoffice-l10n-uk libreoffice-l10n-ve libreoffice-l10n-xh libreoffice-l10n-zh_CN libreoffice-l10n-zh_TW libreoffice-l10n-zu libreoffice-math libreoffice-openclipart libreoffice-pdfimport libreoffice-postgresql libreoffice-presentation-minimizer libreoffice-presenter-screen libreoffice-pyuno libreoffice-report-builder libreoffice-style-crystal libreoffice-style-galaxy libreoffice-style-hicontrast libreoffice-style-oxygen libreoffice-style-tango libreoffice-wiki-publisher libreoffice-writer Update: Thu Jun 14 12:42:58 2012 Importance: security ID: MDVSA-2012:091 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:091 %pre Security issues were identified and fixed in libreoffice: An integer overflow vulnerability in the libreoffice graphic loading code could allow a remote attacker to cause a denial of service (application crash) or potentially execute arbitrary code (CVE-2012-1149). An integer overflow flaw, leading to buffer overflow, was found in the way libreoffice processed invalid Escher graphics records length in PowerPoint documents. An attacker could provide a specially-crafted PowerPoint document that, when opened, would cause libreoffice to crash or, potentially, execute arbitrary code with the privileges of the user running libreoffice (CVE-2012-2334). libreoffice for Mandriva Linux 2011 has been upgraded to the 3.5.4 version which is not vulnerable to these issues. %description LibreOffice is an Open Source, community-developed, multi-platform office productivity suite. It includes the key desktop applications, such as a word processor, spreadsheet, presentation manager, formula editing and drawing program, with a user interface and feature set similar to other office suites. Sophisticated and flexible, LibreOffice also works transparently with a variety of file formats, including Microsoft Office. %package lib64ecpg9.0_6 lib64pq9.0_5 postgresql9.0 postgresql9.0-contrib postgresql9.0-devel postgresql9.0-docs postgresql9.0-pl postgresql9.0-plperl postgresql9.0-plpgsql postgresql9.0-plpython postgresql9.0-pltcl postgresql9.0-server Update: Fri Jun 15 13:03:13 2012 Importance: security ID: MDVSA-2012:092 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:092 %pre Multiple vulnerabilities has been discovered and corrected in postgresql: Fix incorrect password transformation in contrib/pgcrypto's DES crypt() function (Solar Designer). If a password string contained the byte value 0x80, the remainder of the password was ignored, causing the password to be much weaker than it appeared. With this fix, the rest of the string is properly included in the DES hash. Any stored password values that are affected by this bug will thus no longer match, so the stored values may need to be updated (CVE-2012-2143). Ignore SECURITY DEFINER and SET attributes for a procedural language's call handler (Tom Lane). Applying such attributes to a call handler could crash the server (CVE-2012-2655). This advisory provides the latest versions of PostgreSQL that is not vulnerable to these issues. %description PostgreSQL is an advanced Object-Relational database management system (DBMS) that supports almost all SQL constructs (including transactions, subselects and user-defined types and functions). The postgresql package includes the client programs and libraries that you'll need to access a PostgreSQL DBMS server. These PostgreSQL client programs are programs that directly manipulate the internal structure of PostgreSQL databases on a PostgreSQL server. These client programs can be located on the same machine with the PostgreSQL server, or may be on a remote machine which accesses a PostgreSQL server over a network connection. This package contains the client libraries for C and C++, as well as command-line utilities for managing PostgreSQL databases on a PostgreSQL server. If you want to manipulate a PostgreSQL database on a remote PostgreSQL server, you need this package. You also need to install this package if you're installing the postgresql-server package. %package apache-mod_php lib64php5_common5 php-bcmath php-bz2 php-calendar php-cgi php-cli php-ctype php-curl php-dba php-devel php-doc php-dom php-enchant php-exif php-fileinfo php-filter php-fpm php-ftp php-gd php-gettext php-gmp php-hash php-iconv php-imap php-ini php-intl php-json php-ldap php-mbstring php-mcrypt php-mssql php-mysql php-mysqli php-mysqlnd php-odbc php-openssl php-pcntl php-pdo php-pdo_dblib php-pdo_mysql php-pdo_odbc php-pdo_pgsql php-pdo_sqlite php-pgsql php-phar php-posix php-pspell php-readline php-recode php-session php-shmop php-snmp php-soap php-sockets php-sqlite3 php-sqlite php-sybase_ct php-sysvmsg php-sysvsem php-sysvshm php-tidy php-tokenizer php-wddx php-xml php-xmlreader php-xmlrpc php-xmlwriter php-xsl php-zip php-zlib Update: Fri Jun 15 13:59:13 2012 Importance: security ID: MDVSA-2012:093 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:093 %pre Multiple vulnerabilities has been identified and fixed in php: There is a programming error in the DES implementation used in crypt() in ext/standard/crypt_freesec.c when handling input which contains characters that can not be represented with 7-bit ASCII. When the input contains characters with only the most significant bit set (0x80), that character and all characters after it will be ignored (CVE-2012-2143). An integer overflow, leading to heap-based buffer overflow was found in the way Phar extension of the PHP scripting language processed certain fields by manipulating TAR files. A remote attacker could provide a specially-crafted TAR archive file, which once processed in an PHP application using the Phar extension could lead to denial of service (application crash), or, potentially arbitary code execution with the privileges of the user running the application (CVE-2012-2386). The updated php packages have been upgraded to the 5.3.14 version which is not vulnerable to these issues. %description PHP5 is an HTML-embeddable scripting language. PHP5 offers built-in database integration for several commercial and non-commercial database management systems, so writing a database-enabled script with PHP5 is fairly simple. The most common use of PHP5 coding is probably as a replacement for CGI scripts. This version of php has the suhosin patch 0.9.10 applied. Please report bugs here: http://qa.mandriva.com/ so that the official maintainer of this Mandriva package can help you. More information regarding the suhosin patch 0.9.10 here: http://www.suhosin.org/ %package java-1.6.0-openjdk java-1.6.0-openjdk-demo java-1.6.0-openjdk-devel java-1.6.0-openjdk-javadoc java-1.6.0-openjdk-src Update: Mon Jun 18 12:04:13 2012 Importance: security ID: MDVSA-2012:095 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:095 %pre Multiple security issues were identified and fixed in OpenJDK (icedtea6): * S7079902, CVE-2012-1711: Refine CORBA data models * S7143617, CVE-2012-1713: Improve fontmanager layout lookup operations * S7143614, CVE-2012-1716: SynthLookAndFeel stability improvement * S7143606, CVE-2012-1717: File.createTempFile should be improved for temporary files created by the platform. * S7143872, CVE-2012-1718: Improve certificate extension processing * S7143851, CVE-2012-1719: Improve IIOP stub and tie generation in RMIC * S7152811, CVE-2012-1723: Issues in client compiler * S7157609, CVE-2012-1724: Issues with loop * S7160757, CVE-2012-1725: Problem with hotspot/runtime_classfile * S7110720: Issue with vm config file loadingIssue with vm config file loading * S7145239: Finetune package definition restriction * S7160677: missing else in fix for 7152811 The updated packages provides icedtea6-1.11.3 which is not vulnerable to these issues. %description The OpenJDK runtime environment. %package firefox firefox-af firefox-ar firefox-ast firefox-be firefox-bg firefox-bn_BD firefox-bn_IN firefox-br firefox-bs firefox-ca firefox-cs firefox-cy firefox-da firefox-de firefox-devel firefox-el firefox-en_GB firefox-en_ZA firefox-eo firefox-es_AR firefox-es_CL firefox-es_ES firefox-es_MX firefox-et firefox-eu firefox-fa firefox-fi firefox-fr firefox-fy firefox-ga_IE firefox-gd firefox-gl firefox-gu_IN firefox-he firefox-hi firefox-hr firefox-hu firefox-hy firefox-id firefox-is firefox-it firefox-ja firefox-kk firefox-kn firefox-ko firefox-ku firefox-lg firefox-lt firefox-lv firefox-mai firefox-mk firefox-ml firefox-mr firefox-nb_NO firefox-nl firefox-nn_NO firefox-nso firefox-or firefox-pa_IN firefox-pl firefox-pt_BR firefox-pt_PT firefox-ro firefox-ru firefox-si firefox-sk firefox-sl firefox-sq firefox-sr firefox-sv_SE firefox-ta firefox-ta_LK firefox-te firefox-th firefox-tr firefox-uk firefox-vi firefox-zh_CN firefox-zh_TW firefox-zu icedtea-web icedtea-web-javadoc lib64xulrunner13.0.1 lib64xulrunner-devel xulrunner Update: Tue Jun 19 09:27:43 2012 Importance: bugfix ID: MDVA-2012:048 URL: http://www.mandriva.com/security/advisories?name=MDVA-2012:048 %pre This is a maintenance and bugfix release that upgrades firefox to the latest version which resolves various upstream bugs. %description XULRunner is a Mozilla runtime package that can be used to bootstrap XUL+XPCOM applications that are as rich as Firefox and Thunderbird. It will provide mechanisms for installing, upgrading, and uninstalling these applications. XULRunner will also provide libxul, a solution which allows the embedding of Mozilla technologies in other projects and products. %package lib64mysql18 lib64mysqld0 lib64mysql-devel lib64mysqlservices0 lib64mysql-static-devel mysql mysql-bench mysql-client mysql-common mysql-common-core mysql-core Update: Wed Jun 20 09:58:08 2012 Importance: bugfix ID: MDVA-2012:049 URL: http://www.mandriva.com/security/advisories?name=MDVA-2012:049 %pre This is a maintenance and bugfix release that upgrades mysql to the latest version which resolves various upstream bugs. %description The MySQL(TM) software delivers a very fast, multi-threaded, multi-user, and robust SQL (Structured Query Language) database server. MySQL Server is intended for mission-critical, heavy-load production systems as well as for embedding into mass-deployed software. MySQL is a trademark of MySQL AB. The mysql server is compiled with the following storage engines: - InnoDB Storage Engine - Archive Storage Engine - CSV Storage Engine - Federated Storage Engine - User Defined Functions (UDFs). - Blackhole Storage Engine - Partition Storage Engine - Perfschema Storage Engine %package lib64python2.7 lib64python-devel python python-docs tkinter tkinter-apps Update: Wed Jun 20 15:36:05 2012 Importance: security ID: MDVSA-2012:097 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:097 %pre Multiple vulnerabilities has been discovered and corrected in python: The _ssl module would always disable the CBC IV attack countermeasure (CVE-2011-3389). A race condition was found in the way the Python distutils module set file permissions during the creation of the .pypirc file. If a local user had access to the home directory of another user who is running distutils, they could use this flaw to gain access to that user's .pypirc file, which can contain usernames and passwords for code repositories (CVE-2011-4944). A flaw was found in the way the Python SimpleXMLRPCServer module handled clients disconnecting prematurely. A remote attacker could use this flaw to cause excessive CPU consumption on a server using SimpleXMLRPCServer (CVE-2012-0845). Hash table collisions CPU usage DoS for the embedded copy of expat (CVE-2012-0876). A denial of service flaw was found in the implementation of associative arrays (dictionaries) in Python. An attacker able to supply a large number of inputs to a Python application (such as HTTP POST request parameters sent to a web application) that are used as keys when inserting data into an array could trigger multiple hash function collisions, making array operations take an excessive amount of CPU time. To mitigate this issue, randomization has been added to the hash function to reduce the chance of an attacker successfully causing intentional collisions (CVE-2012-1150). The updated packages have been patched to correct these issues. %description Python is an interpreted, interactive, object-oriented programming language often compared to Tcl, Perl, Scheme or Java. Python includes modules, classes, exceptions, very high level dynamic data types and dynamic typing. Python supports interfaces to many system calls and libraries, as well as to various windowing systems (X11, Motif, Tk, Mac and MFC). Programmers can write new built-in modules for Python in C or C++. Python can be used as an extension language for applications that need a programmable interface. This package contains most of the standard Python modules, as well as modules for interfacing to the Tix widget set for Tk and RPM. Note that documentation for Python is provided in the python-docs package. %package lib64xml2_2 lib64xml2-devel libxml2-python libxml2-utils Update: Thu Jun 21 09:35:33 2012 Importance: security ID: MDVSA-2012:098 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:098 %pre A vulnerability has been discovered and corrected in libxml2: An Off-by-one error in libxml2 allows remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via unknown vectors (CVE-2011-3102). The updated packages have been patched to correct this issue. %description This library allows you to manipulate XML files. It includes support for reading, modifying and writing XML and HTML files. There is DTDs support: this includes parsing and validation even with complex DtDs, either at parse time or later once the document has been modified. The output can be a simple SAX stream or and in-memory DOM-like representations. In this case one can use the built-in XPath and XPointer implementation to select subnodes or ranges. A flexible Input/Output mechanism is available, with existing HTTP and FTP modules and combined to a URI library. %package lib64xml2_2 lib64xml2-devel libxml2-python libxml2-utils Update: Thu Jun 21 09:43:16 2012 Importance: security ID: MDVSA-2012:098 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:098 %pre A vulnerability has been discovered and corrected in libxml2: An Off-by-one error in libxml2 allows remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via unknown vectors (CVE-2011-3102). The updated packages have been patched to correct this issue. %description This library allows you to manipulate XML files. It includes support for reading, modifying and writing XML and HTML files. There is DTDs support: this includes parsing and validation even with complex DtDs, either at parse time or later once the document has been modified. The output can be a simple SAX stream or and in-memory DOM-like representations. In this case one can use the built-in XPath and XPointer implementation to select subnodes or ranges. A flexible Input/Output mechanism is available, with existing HTTP and FTP modules and combined to a URI library. %package lib64net-snmp25 lib64net-snmp-devel lib64net-snmp-static-devel net-snmp net-snmp-mibs net-snmp-tkmib net-snmp-trapd net-snmp-utils perl-NetSNMP python-netsnmp Update: Thu Jun 21 13:33:33 2012 Importance: security ID: MDVSA-2012:099 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:099 %pre A vulnerability has been discovered and corrected in net-snmp: An array index error, leading to out-of heap-based buffer read flaw was found in the way net-snmp agent performed entries lookup in the extension table. When certain MIB subtree was handled by the extend directive, a remote attacker having read privilege to the subtree could use this flaw to cause a denial of service (snmpd crash) via SNMP GET request involving a non-existent extension table entry (CVE-2012-2141). The updated packages have been patched to correct this issue. %description SNMP (Simple Network Management Protocol) is a protocol used for network management. The NET-SNMP project includes various SNMP tools: an extensible agent, an SNMP library, tools for requesting or setting information from SNMP agents, tools for generating and handling SNMP traps, a version of the netstat command which uses SNMP, and a Tk/Perl mib browser. This package contains the snmpd and snmptrapd daemons, documentation, etc. You will probably also want to install the net-snmp-utils package, which contains NET-SNMP utilities. %package lib64tiff3 lib64tiff-devel lib64tiff-static-devel libtiff-progs Update: Wed Jul 04 11:55:30 2012 Importance: security ID: MDVSA-2012:101 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:101 %pre Multiple vulnerabilities has been discovered and corrected in libtiff: libtiff did not properly convert between signed and unsigned integer values, leading to a buffer overflow. An attacker could use this flaw to create a specially-crafted TIFF file that, when opened, would cause an application linked against libtiff to crash or, possibly, execute arbitrary code (CVE-2012-2088). Multiple integer overflow flaws, leading to heap-based buffer overflows, were found in the tiff2pdf tool. An attacker could use these flaws to create a specially-crafted TIFF file that would cause tiff2pdf to crash or, possibly, execute arbitrary code (CVE-2012-2113). The updated packages have been patched to correct these issues. %description The libtiff package contains a library of functions for manipulating TIFF (Tagged Image File Format) image format files. TIFF is a widely used file format for bitmapped images. TIFF files usually end in the .tif extension and they are often quite large. %package krb5 krb5-pkinit-openssl krb5-server krb5-server-ldap krb5-workstation lib64krb53 lib64krb53-devel Update: Fri Jul 06 12:42:03 2012 Importance: security ID: MDVSA-2012:102 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:102 %pre A vulnerability has been discovered and corrected in krb5: Fix a kadmind denial of service issue (null pointer dereference), which could only be triggered by an administrator with the create privilege (CVE-2012-1013). The updated packages have been patched to correct this issue. %description Kerberos V5 is a trusted-third-party network authentication system, which can improve your network's security by eliminating the insecure practice of cleartext passwords. %package automake automake1.7 Update: Thu Jul 12 12:14:01 2012 Importance: security ID: MDVSA-2012:103 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:103 %pre A vulnerability has been discovered and corrected in automake: A race condition in automake (lib/am/distdir.am) could allow a local attacker to run arbitrary code with the privileges of the user running make distcheck (CVE-2012-3386). The updated packages have been patched to correct this issue. %description Automake is a tool for automatically generating Makefiles compliant with the GNU Coding Standards. You should install Automake if you are developing software and would like to use its capabilities of automatically generating GNU standard Makefiles. If you install Automake, you will also need to install GNU's Autoconf package. %package lib64openjpeg2 lib64openjpeg-devel Update: Thu Jul 12 12:43:55 2012 Importance: security ID: MDVSA-2012:104 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:104 %pre Multiple vulnerabilities has been discovered and corrected in openjpeg: OpenJPEG allocated insufficient memory when encoding JPEG 2000 files from input images that have certain color depths. A remote attacker could provide a specially-crafted image file that, when opened in an application linked against OpenJPEG (such as image_to_j2k), would cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application (CVE-2009-5030). An input validation flaw, leading to a heap-based buffer overflow, was found in the way OpenJPEG handled the tile number and size in an image tile header. A remote attacker could provide a specially-crafted image file that, when decoded using an application linked against OpenJPEG, would cause the application to crash or, potentially, execute arbitrary code with the privileges of the user running the application (CVE-2012-3358). The updated packages have been patched to correct these issues. %description The OpenJPEG library is an open-source JPEG 2000 codec written in C language. It has been developed in order to promote the use of JPEG 2000, the new still-image compression standard from the Joint Photographic Experts Group (JPEG). %package finch lib64finch0 lib64purple0 lib64purple-devel pidgin pidgin-bonjour pidgin-client pidgin-gevolution pidgin-i18n pidgin-meanwhile pidgin-perl pidgin-plugins pidgin-silc pidgin-tcl Update: Thu Jul 12 15:11:45 2012 Importance: security ID: MDVSA-2012:105 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:105 %pre A vulnerability has been discovered and corrected in pidgin: Incorrect handing of inline images in incoming instant messages can cause a buffer overflow and in some cases can be exploited to execute arbitrary code (CVE-2012-3374). This update provides pidgin 2.10.6, which is not vulnerable to this issue. %description Pidgin allows you to talk to anyone using a variety of messaging protocols including AIM, MSN, Yahoo!, Jabber, Bonjour, Gadu-Gadu, ICQ, IRC, Novell Groupwise, QQ, Lotus Sametime, SILC, Simple and Zephyr. These protocols are implemented using a modular, easy to use design. To use a protocol, just add an account using the account editor. Pidgin supports many common features of other clients, as well as many unique features, such as perl scripting, TCL scripting and C plugins. Pidgin is not affiliated with or endorsed by America Online, Inc., Microsoft Corporation, Yahoo! Inc., or ICQ Inc. %package lib64exif12 lib64exif-devel libexif12-common Update: Fri Jul 13 11:44:25 2012 Importance: security ID: MDVSA-2012:106 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:106 %pre Multiple vulnerabilities has been discovered and corrected in libexif: A heap-based out-of-bounds array read in the exif_entry_get_value function in libexif/exif-entry.c in libexif 0.6.20 and earlier allows remote attackers to cause a denial of service or possibly obtain potentially sensitive information from process memory via an image with crafted EXIF tags (CVE-2012-2812). A heap-based out-of-bounds array read in the exif_convert_utf16_to_utf8 function in libexif/exif-entry.c in libexif 0.6.20 and earlier allows remote attackers to cause a denial of service or possibly obtain potentially sensitive information from process memory via an image with crafted EXIF tags (CVE-2012-2813). A buffer overflow in the exif_entry_format_value function in libexif/exif-entry.c in libexif 0.6.20 allows remote attackers to cause a denial of service or possibly execute arbitrary code via an image with crafted EXIF tags (CVE-2012-2814). A heap-based out-of-bounds array read in the exif_data_load_data function in libexif 0.6.20 and earlier allows remote attackers to cause a denial of service or possibly obtain potentially sensitive information from process memory via an image with crafted EXIF tags (CVE-2012-2836). A divide-by-zero error in the mnote_olympus_entry_get_value function while formatting EXIF maker note tags in libexif 0.6.20 and earlier allows remote attackers to cause a denial of service via an image with crafted EXIF tags (CVE-2012-2837). An off-by-one error in the exif_convert_utf16_to_utf8 function in libexif/exif-entry.c in libexif 0.6.20 and earlier allows remote attackers to cause a denial of service or possibly execute arbitrary code via an image with crafted EXIF tags (CVE-2012-2840). An integer underflow in the exif_entry_get_value function can cause a heap overflow and potentially arbitrary code execution while formatting an EXIF tag, if the function is called with a buffer size parameter equal to zero or one (CVE-2012-2841). The updated packages have been upgraded to the 0.6.21 version which is not vulnerable to these issues. %description Most digital cameras produce EXIF files, which are JPEG files with extra tags that contain information about the image. The EXIF library allows you to parse an EXIF file and read the data from those tags. %package exif Update: Fri Jul 13 11:57:24 2012 Importance: security ID: MDVSA-2012:107 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:107 %pre A vulnerability has been discovered and corrected in exif: An integer overflow in the function jpeg_data_load_data in the exif program could cause a data read beyond the end of a buffer, causing an application crash or leakage of potentially sensitive information when parsing a crafted JPEG file (CVE-2012-2845). The updated packages have been upgraded to the 0.6.21 version which is not vulnerable to this issue. %description Most digital cameras produce EXIF files, which are JPEG files with extra tags that contain information about the image. The EXIF library allows you to parse an EXIF file and read the data from those tags. This package contains a command line frontend for the EXIF library. %package lib64mysql18 lib64mysqld0 lib64mysql-devel lib64mysqlservices0 lib64mysql-static-devel mysql mysql-bench mysql-client mysql-common mysql-common-core mysql-core Update: Fri Jul 13 15:06:13 2012 Importance: bugfix ID: MDVA-2012:051 URL: http://www.mandriva.com/security/advisories?name=MDVA-2012:051 %pre This is a maintenance and bugfix release that upgrades mysql to the latest version which resolves various upstream bugs. %description The MySQL(TM) software delivers a very fast, multi-threaded, multi-user, and robust SQL (Structured Query Language) database server. MySQL Server is intended for mission-critical, heavy-load production systems as well as for embedding into mass-deployed software. MySQL is a trademark of MySQL AB. The mysql server is compiled with the following storage engines: - InnoDB Storage Engine - Archive Storage Engine - CSV Storage Engine - Federated Storage Engine - User Defined Functions (UDFs). - Blackhole Storage Engine - Partition Storage Engine - Perfschema Storage Engine %package apache-mod_php lib64php5_common5 php-bcmath php-bz2 php-calendar php-cgi php-cli php-ctype php-curl php-dba php-devel php-doc php-dom php-enchant php-exif php-fileinfo php-filter php-fpm php-ftp php-gd php-gettext php-gmp php-hash php-iconv php-imap php-ini php-intl php-json php-ldap php-mbstring php-mcrypt php-mssql php-mysql php-mysqli php-mysqlnd php-odbc php-openssl php-pcntl php-pdo php-pdo_dblib php-pdo_mysql php-pdo_odbc php-pdo_pgsql php-pdo_sqlite php-pgsql php-phar php-posix php-pspell php-readline php-recode php-session php-shmop php-snmp php-soap php-sockets php-sqlite3 php-sqlite php-sybase_ct php-sysvmsg php-sysvsem php-sysvshm php-tidy php-timezonedb php-tokenizer php-wddx php-xml php-xmlreader php-xmlrpc php-xmlwriter php-xsl php-zip php-zlib Update: Mon Jul 23 13:45:19 2012 Importance: security ID: MDVSA-2012:108 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:108 %pre Multiple vulnerabilities has been discovered and corrected in php: Unspecified vulnerability in the _php_stream_scandir function in the stream implementation in PHP before 5.3.15 and 5.4.x before 5.4.5 has unknown impact and remote attack vectors, related to an overflow (CVE-2012-2688). The SQLite functionality in PHP before 5.3.15 allows remote attackers to bypass the open_basedir protection mechanism via unspecified vectors (CVE-2012-3365). The updated packages have been upgraded to the 5.3.15 version which is not vulnerable to these issues. Additionally the php-timezonedb packages has been upgraded to the latest version as well. %description PHP5 is an HTML-embeddable scripting language. PHP5 offers built-in database integration for several commercial and non-commercial database management systems, so writing a database-enabled script with PHP5 is fairly simple. The most common use of PHP5 coding is probably as a replacement for CGI scripts. This version of php has the suhosin patch 0.9.10 applied. Please report bugs here: http://qa.mandriva.com/ so that the official maintainer of this Mandriva package can help you. More information regarding the suhosin patch 0.9.10 here: http://www.suhosin.org/ %package lib64xslt1 lib64xslt-devel python-libxslt xsltproc Update: Mon Jul 23 14:44:18 2012 Importance: security ID: MDVSA-2012:109 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:109 %pre A vulnerability has been discovered and corrected in libxslt: The XSL implementation in libxslt allows remote attackers to cause a denial of service (incorrect read operation) via unspecified vectors (CVE-2012-2825). The updated packages have been patched to correct this issue. %description This C library allows to transform XML files into other XML files (or HTML, text, ...) using the standard XSLT stylesheet transformation mechanism. %package firefox firefox-devel icedtea-web icedtea-web-javadoc lib64nss3 lib64nss-devel lib64nss-static-devel lib64xulrunner14.0.1 lib64xulrunner-devel mozilla-thunderbird mozilla-thunderbird-ar mozilla-thunderbird-be mozilla-thunderbird-bg mozilla-thunderbird-bn_BD mozilla-thunderbird-br mozilla-thunderbird-ca mozilla-thunderbird-cs mozilla-thunderbird-da mozilla-thunderbird-de mozilla-thunderbird-el mozilla-thunderbird-en_GB mozilla-thunderbird-enigmail mozilla-thunderbird-enigmail-ar mozilla-thunderbird-enigmail-ca mozilla-thunderbird-enigmail-cs mozilla-thunderbird-enigmail-de mozilla-thunderbird-enigmail-el mozilla-thunderbird-enigmail-es mozilla-thunderbird-enigmail-fi mozilla-thunderbird-enigmail-fr mozilla-thunderbird-enigmail-it mozilla-thunderbird-enigmail-ja mozilla-thunderbird-enigmail-ko mozilla-thunderbird-enigmail-nb mozilla-thunderbird-enigmail-nl mozilla-thunderbird-enigmail-pl mozilla-thunderbird-enigmail-pt mozilla-thunderbird-enigmail-pt_BR mozilla-thunderbird-enigmail-ru mozilla-thunderbird-enigmail-sl mozilla-thunderbird-enigmail-sv mozilla-thunderbird-enigmail-tr mozilla-thunderbird-enigmail-vi mozilla-thunderbird-enigmail-zh_CN mozilla-thunderbird-enigmail-zh_TW mozilla-thunderbird-es_AR mozilla-thunderbird-es_ES mozilla-thunderbird-et mozilla-thunderbird-eu mozilla-thunderbird-fi mozilla-thunderbird-fr mozilla-thunderbird-fy mozilla-thunderbird-ga mozilla-thunderbird-gd mozilla-thunderbird-gl mozilla-thunderbird-he mozilla-thunderbird-hu mozilla-thunderbird-id mozilla-thunderbird-is mozilla-thunderbird-it mozilla-thunderbird-ja mozilla-thunderbird-ko mozilla-thunderbird-lightning mozilla-thunderbird-lt mozilla-thunderbird-nb_NO mozilla-thunderbird-nl mozilla-thunderbird-nn_NO mozilla-thunderbird-pl mozilla-thunderbird-pt_BR mozilla-thunderbird-pt_PT mozilla-thunderbird-ro mozilla-thunderbird-ru mozilla-thunderbird-si mozilla-thunderbird-sk mozilla-thunderbird-sl mozilla-thunderbird-sq mozilla-thunderbird-sv_SE mozilla-thunderbird-ta_LK mozilla-thunderbird-tr mozilla-thunderbird-uk mozilla-thunderbird-vi mozilla-thunderbird-zh_CN mozilla-thunderbird-zh_TW nsinstall nss rootcerts rootcerts-java xulrunner Update: Tue Jul 24 10:32:09 2012 Importance: security ID: MDVSA-2012:110 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:110 %pre Security issues were identified and fixed in mozilla firefox and thunderbird: Mozilla developers identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these bugs showed evidence of memory corruption under certain circumstances, and we presume that with enough effort at least some of these could be exploited to run arbitrary code (CVE-2012-1949, CVE-2012-1948). Security researcher Mario Gomes andresearch firm Code Audit Labs reported a mechanism to short-circuit page loads through drag and drop to the addressbar by canceling the page load. This causes the address of the previously site entered to be displayed in the addressbar instead of the currently loaded page. This could lead to potential phishing attacks on users (CVE-2012-1950). Google security researcher Abhishek Arya used the Address Sanitizer tool to uncover four issues: two use-after-free problems, one out of bounds read bug, and a bad cast. The first use-after-free problem is caused when an array of nsSMILTimeValueSpec objects is destroyed but attempts are made to call into objects in this array later. The second use-after-free problem is in nsDocument::AdoptNode when it adopts into an empty document and then adopts into another document, emptying the first one. The heap buffer overflow is in ElementAnimations when data is read off of end of an array and then pointers are dereferenced. The bad cast happens when nsTableFrame::InsertFrames is called with frames in aFrameList that are a mix of row group frames and column group frames. AppendFrames is not able to handle this mix. All four of these issues are potentially exploitable (CVE-2012-1951, CVE-2012-1954, CVE-2012-1953, CVE-2012-1952). Security researcher Mariusz Mlynski reported an issue with spoofing of the location property. In this issue, calls to history.forward and history.back are used to navigate to a site while displaying the previous site in the addressbar but changing the baseURI to the newer site. This can be used for phishing by allowing the user input form or other data on the newer, attacking, site while appearing to be on the older, displayed site (CVE-2012-1955). Mozilla security researcher moz_bug_r_a4 reported a cross-site scripting (XSS) attack through the context menu using a data: URL. In this issue, context menu functionality (View Image, Show only this frame, and View background image) are disallowed in a javascript: URL but allowed in a data: URL, allowing for XSS. This can lead to arbitrary code execution (CVE-2012-1966). Security researcher Mario Heiderich reported that javascript could be executed in the HTML feed-view using <embed> tag within the RSS <description>. This problem is due to <embed> tags not being filtered out during parsing and can lead to a potential cross-site scripting (XSS) attack. The flaw existed in a parser utility class and could affect other parts of the browser or add-ons which rely on that class to sanitize untrusted input (CVE-2012-1957). Security researcher Arthur Gerkis used the Address Sanitizer tool to find a use-after-free in nsGlobalWindow::PageHidden when mFocusedContent is released and oldFocusedContent is used afterwards. This use-after-free could possibly allow for remote code execution (CVE-2012-1958). Mozilla developer Bobby Holley found that same-compartment security wrappers (SCSW) can be bypassed by passing them to another compartment. Cross-compartment wrappers often do not go through SCSW, but have a filtering policy built into them. When an object is wrapped cross-compartment, the SCSW is stripped off and, when the object is read read back, it is not known that SCSW was previously present, resulting in a bypassing of SCSW. This could result in untrusted content having access to the XBL that implements browser functionality (CVE-2012-1959). Google developer Tony Payne reported an out of bounds (OOB) read in QCMS, Mozillas color management library. With a carefully crafted color profile portions of a user's memory could be incorporated into a transformed image and possibly deciphered (CVE-2012-1960). Bugzilla developer Fredric Buclin reported that the X-Frame-Options header is ignored when the value is duplicated, for example X-Frame-Options: SAMEORIGIN, SAMEORIGIN. This duplication occurs for unknown reasons on some websites and when it occurs results in Mozilla browsers not being protected against possible clickjacking attacks on those pages (CVE-2012-1961). Security researcher Bill Keese reported a memory corruption. This is caused by JSDependentString::undepend changing a dependent string into a fixed string when there are additional dependent strings relying on the same base. When the undepend occurs during conversion, the base data is freed, leaving other dependent strings with dangling pointers. This can lead to a potentially exploitable crash (CVE-2012-1962). Security researcher Karthikeyan Bhargavan of Prosecco at INRIA reported Content Security Policy (CSP) 1.0 implementation errors. CSP violation reports generated by Firefox and sent to the report-uri location include sensitive data within the blocked-uri parameter. These include fragment components and query strings even if the blocked-uri parameter has a different origin than the protected resource. This can be used to retrieve a user's OAuth 2.0 access tokens and OpenID credentials by malicious sites (CVE-2012-1963). Security Researcher Matt McCutchen reported that a clickjacking attack using the certificate warning page. A man-in-the-middle (MITM) attacker can use an iframe to display its own certificate error warning page (about:certerror) with the Add Exception button of a real warning page from a malicious site. This can mislead users to adding a certificate exception for a different site than the perceived one. This can lead to compromised communications with the user perceived site through the MITM attack once the certificate exception has been added (CVE-2012-1964). Security researchers Mario Gomes and Soroush Dalili reported that since Mozilla allows the pseudo-protocol feed: to prefix any valid URL, it is possible to construct feed:javascript: URLs that will execute scripts in some contexts. On some sites it may be possible to use this to evade output filtering that would otherwise strip javascript: URLs and thus contribute to cross-site scripting (XSS) problems on these sites (CVE-2012-1965). Mozilla security researcher moz_bug_r_a4 reported a arbitrary code execution attack using a javascript: URL. The Gecko engine features a JavaScript sandbox utility that allows the browser or add-ons to safely execute script in the context of a web page. In certain cases, javascript: URLs are executed in such a sandbox with insufficient context that can allow those scripts to escape from the sandbox and run with elevated privilege. This can lead to arbitrary code execution (CVE-2012-1967). The mozilla firefox and thunderbird packages has been upgraded to the latest respective versions which is unaffected by these security flaws. Additionally the rootcerts packages has been upgraded to the latest version which brings updated root CA data. %description XULRunner is a Mozilla runtime package that can be used to bootstrap XUL+XPCOM applications that are as rich as Firefox and Thunderbird. It will provide mechanisms for installing, upgrading, and uninstalling these applications. XULRunner will also provide libxul, a solution which allows the embedding of Mozilla technologies in other projects and products. %package lib64gdata7 lib64gdata-devel libgdata-i18n Update: Wed Jul 25 12:57:55 2012 Importance: security ID: MDVSA-2012:111 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:111 %pre A vulnerability has been discovered and corrected in libgdata: It was found that previously libgdata, a GLib-based library for accessing online service APIs using the GData protocol, did not perform SSL certificates validation even for secured connections. An application, linked against the libgdata library and holding the trust about the other side of the connection being the valid owner of the certificate, could be tricked into accepting of a spoofed SSL certificate by mistake (MITM attack) (CVE-2012-1177). The updated packages have been patched to correct this issue. %description libgdata is a GLib-based library for accessing online service APIs using the GData protocol --- most notably, Google's services. It provides APIs to access the common Google services, and has full asynchronous support. %package perl-DBD-Pg Update: Thu Jul 26 10:17:57 2012 Importance: security ID: MDVSA-2012:112 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:112 %pre A vulnerability has been discovered and corrected in perl-DBD-Pg: Two format string flaws were found in the way perl-DBD-Pg. A rogue server could provide a specially-crafted database warning or specially-crafted DBD statement, which once processed by the perl-DBD-Pg interface would lead to perl-DBD-Pg based process crash (CVE-2012-1151). The updated packages have been patched to correct this issue. %description PostgreSQL database driver for the DBI module %package arpwatch Update: Thu Jul 26 13:20:55 2012 Importance: security ID: MDVSA-2012:113 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:113 %pre A vulnerability has been discovered and corrected in arpwatch: arpwatch 2.1a15, as used by Red Hat, Debian, Fedora, and possibly others, does not properly drop supplementary groups, which might allow attackers to gain root privileges by leveraging other vulnerabilities in the daemon (CVE-2012-2653). The updated packages have been patched to correct this issue. %description The arpwatch package contains arpwatch and arpsnmp. Arpwatch and arpsnmp are both network monitoring tools. Both utilities monitor Ethernet or FDDI network traffic and build databases of Ethernet/IP address pairs, and can report certain changes via email. Install the arpwatch package if you need networking monitoring devices which will automatically keep traffic of the IP addresses on your network. %package dhcp-client dhcp-common dhcp-devel dhcp-doc dhcp-relay dhcp-server Update: Thu Jul 26 15:55:34 2012 Importance: security ID: MDVSA-2012:115 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:115 %pre Multiple vulnerabilities has been discovered and corrected in ISC DHCP: An unexpected client identifier parameter can cause the ISC DHCP daemon to segmentation fault when running in DHCPv6 mode, resulting in a denial of service to further client requests. In order to exploit this condition, an attacker must be able to send requests to the DHCP server (CVE-2012-3570 An error in the handling of malformed client identifiers can cause a DHCP server running affected versions (see Impact) to enter a state where further client requests are not processed and the server process loops endlessly, consuming all available CPU cycles. Under normal circumstances this condition should not be triggered, but a non-conforming or malicious client could deliberately trigger it in a vulnerable server. In order to exploit this condition an attacker must be able to send requests to the DHCP server (CVE-2012-3571 Two memory leaks have been found and fixed in ISC DHCP. Both are reproducible when running in DHCPv6 mode (with the -6 command-line argument.) The first leak is confirmed to only affect servers operating in DHCPv6 mode, but based on initial code analysis the second may theoretically affect DHCPv4 servers (though this has not been demonstrated.) (CVE-2012-3954). The updated packages have been upgraded to the latest version (4.2.4-P1) which is not affected by these issues. %description DHCP (Dynamic Host Configuration Protocol) is a protocol which allows individual devices on an IP network to get their own network configuration information (IP address, subnetmask, broadcast address, etc.) from a DHCP server. The overall purpose of DHCP is to make it easier to administer a large network. The dhcp package includes the DHCP server and a DHCP relay agent. You will also need to install the dhcp-client or dhcpcd package, or pump or dhcpxd, which provides the DHCP client daemon, on client machines. If you want the DHCP server and/or relay, you will also need to install the dhcp-server and/or dhcp-relay packages. %package python-pycrypto Update: Fri Jul 27 12:03:38 2012 Importance: security ID: MDVSA-2012:117 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:117 %pre A vulnerability has been discovered and corrected in python-pycrypto: PyCrypto before 2.6 does not produce appropriate prime numbers when using an ElGamal scheme to generate a key, which reduces the signature space or public key space and makes it easier for attackers to conduct brute force attacks to obtain the private key (CVE-2012-2417). The updated packages have been patched to correct this issue. %description The Toolkit is a collection of cryptographic algorithms and protocols, implemented for use from Python. Among the contents of the package: * Hash functions: MD2, MD4, RIPEMD. * Block encryption algorithms: AES, ARC2, Blowfish, CAST, DES, Triple- DES, IDEA, RC5. * Stream encryption algorithms: ARC4, simple XOR. * Public-key algorithms: RSA, DSA, ElGamal, qNEW. * Protocols: All-or-nothing transforms, chaffing/winnowing. * Miscellaneous: RFC1751 module for converting 128-key keys into a set of English words, primality testing. * Some demo programs (currently all quite old and outdated). %package bind bind-devel bind-doc bind-utils Update: Sun Jul 29 12:16:54 2012 Importance: security ID: MDVSA-2012:119 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:119 %pre A vulnerability was discovered and corrected in bind: High numbers of queries with DNSSEC validation enabled can cause an assertion failure in named, caused by using a bad cache data structure before it has been initialized (CVE-2012-3817). The updated packages have been upgraded to bind 9.7.6-P2 and 9.8.3-P2 which is not vulnerable to this issue. %description BIND (Berkeley Internet Name Domain) is an implementation of the DNS (domain Name System) protocols. BIND includes a DNS server (named), which resolves host names to IP addresses, and a resolver library (routines for applications to use when interfacing with DNS). A DNS server allows clients to name resources or objects and share the information with other network machines. The named DNS server can be used on workstations as a caching name server, but is generally only needed on one machine for an entire network. Note that the configuration files for making BIND act as a simple caching nameserver are included in the caching-nameserver package. Install the bind package if you need a DNS server for your network. If you want bind to act a caching name server, you will also need to install the caching-nameserver package. Many BIND 8 features previously unimplemented in BIND 9, including domain-specific forwarding, the \$GENERATE master file directive, and the "blackhole", "dialup", and "sortlist" options Forwarding of dynamic update requests; this is enabled by the "allow-update-forwarding" option A new, simplified database interface and a number of sample drivers based on it; see doc/dev/sdb for details Support for building single-threaded servers for environments that do not supply POSIX threads New configuration options: "min-refresh-time", "max-refresh-time", "min-retry-time", "max-retry-time", "additional-from-auth", "additional-from-cache", "notify explicit" Faster lookups, particularly in large zones. Build Options: --without sdb_ldap Build without ldap simple database support (enabled per default) --with sdb_mysql Build with MySQL database support (disables ldap support, it's either way.) %package firefox-af firefox-ar firefox-ast firefox-be firefox-bg firefox-bn_BD firefox-bn_IN firefox-br firefox-bs firefox-ca firefox-cs firefox-cy firefox-da firefox-de firefox-el firefox-en_GB firefox-en_ZA firefox-eo firefox-es_AR firefox-es_CL firefox-es_ES firefox-es_MX firefox-et firefox-eu firefox-fa firefox-fi firefox-fr firefox-fy firefox-ga_IE firefox-gd firefox-gl firefox-gu_IN firefox-he firefox-hi firefox-hr firefox-hu firefox-hy firefox-id firefox-is firefox-it firefox-ja firefox-kk firefox-kn firefox-ko firefox-ku firefox-lg firefox-lt firefox-lv firefox-mai firefox-mk firefox-ml firefox-mr firefox-nb_NO firefox-nl firefox-nn_NO firefox-nso firefox-or firefox-pa_IN firefox-pl firefox-pt_BR firefox-pt_PT firefox-ro firefox-ru firefox-si firefox-sk firefox-sl firefox-sq firefox-sr firefox-sv_SE firefox-ta firefox-ta_LK firefox-te firefox-th firefox-tr firefox-uk firefox-vi firefox-zh_CN firefox-zh_TW firefox-zu Update: Mon Jul 30 10:00:52 2012 Importance: security ID: MDVSA-2012:110-1 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:110-1 %pre Security issues were identified and fixed in mozilla firefox and thunderbird: Mozilla developers identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these bugs showed evidence of memory corruption under certain circumstances, and we presume that with enough effort at least some of these could be exploited to run arbitrary code (CVE-2012-1949, CVE-2012-1948). Security researcher Mario Gomes andresearch firm Code Audit Labs reported a mechanism to short-circuit page loads through drag and drop to the addressbar by canceling the page load. This causes the address of the previously site entered to be displayed in the addressbar instead of the currently loaded page. This could lead to potential phishing attacks on users (CVE-2012-1950). Google security researcher Abhishek Arya used the Address Sanitizer tool to uncover four issues: two use-after-free problems, one out of bounds read bug, and a bad cast. The first use-after-free problem is caused when an array of nsSMILTimeValueSpec objects is destroyed but attempts are made to call into objects in this array later. The second use-after-free problem is in nsDocument::AdoptNode when it adopts into an empty document and then adopts into another document, emptying the first one. The heap buffer overflow is in ElementAnimations when data is read off of end of an array and then pointers are dereferenced. The bad cast happens when nsTableFrame::InsertFrames is called with frames in aFrameList that are a mix of row group frames and column group frames. AppendFrames is not able to handle this mix. All four of these issues are potentially exploitable (CVE-2012-1951, CVE-2012-1954, CVE-2012-1953, CVE-2012-1952). Security researcher Mariusz Mlynski reported an issue with spoofing of the location property. In this issue, calls to history.forward and history.back are used to navigate to a site while displaying the previous site in the addressbar but changing the baseURI to the newer site. This can be used for phishing by allowing the user input form or other data on the newer, attacking, site while appearing to be on the older, displayed site (CVE-2012-1955). Mozilla security researcher moz_bug_r_a4 reported a cross-site scripting (XSS) attack through the context menu using a data: URL. In this issue, context menu functionality (View Image, Show only this frame, and View background image) are disallowed in a javascript: URL but allowed in a data: URL, allowing for XSS. This can lead to arbitrary code execution (CVE-2012-1966). Security researcher Mario Heiderich reported that javascript could be executed in the HTML feed-view using <embed> tag within the RSS <description>. This problem is due to <embed> tags not being filtered out during parsing and can lead to a potential cross-site scripting (XSS) attack. The flaw existed in a parser utility class and could affect other parts of the browser or add-ons which rely on that class to sanitize untrusted input (CVE-2012-1957). Security researcher Arthur Gerkis used the Address Sanitizer tool to find a use-after-free in nsGlobalWindow::PageHidden when mFocusedContent is released and oldFocusedContent is used afterwards. This use-after-free could possibly allow for remote code execution (CVE-2012-1958). Mozilla developer Bobby Holley found that same-compartment security wrappers (SCSW) can be bypassed by passing them to another compartment. Cross-compartment wrappers often do not go through SCSW, but have a filtering policy built into them. When an object is wrapped cross-compartment, the SCSW is stripped off and, when the object is read read back, it is not known that SCSW was previously present, resulting in a bypassing of SCSW. This could result in untrusted content having access to the XBL that implements browser functionality (CVE-2012-1959). Google developer Tony Payne reported an out of bounds (OOB) read in QCMS, Mozillas color management library. With a carefully crafted color profile portions of a user's memory could be incorporated into a transformed image and possibly deciphered (CVE-2012-1960). Bugzilla developer Fredric Buclin reported that the X-Frame-Options header is ignored when the value is duplicated, for example X-Frame-Options: SAMEORIGIN, SAMEORIGIN. This duplication occurs for unknown reasons on some websites and when it occurs results in Mozilla browsers not being protected against possible clickjacking attacks on those pages (CVE-2012-1961). Security researcher Bill Keese reported a memory corruption. This is caused by JSDependentString::undepend changing a dependent string into a fixed string when there are additional dependent strings relying on the same base. When the undepend occurs during conversion, the base data is freed, leaving other dependent strings with dangling pointers. This can lead to a potentially exploitable crash (CVE-2012-1962). Security researcher Karthikeyan Bhargavan of Prosecco at INRIA reported Content Security Policy (CSP) 1.0 implementation errors. CSP violation reports generated by Firefox and sent to the report-uri location include sensitive data within the blocked-uri parameter. These include fragment components and query strings even if the blocked-uri parameter has a different origin than the protected resource. This can be used to retrieve a user's OAuth 2.0 access tokens and OpenID credentials by malicious sites (CVE-2012-1963). Security Researcher Matt McCutchen reported that a clickjacking attack using the certificate warning page. A man-in-the-middle (MITM) attacker can use an iframe to display its own certificate error warning page (about:certerror) with the Add Exception button of a real warning page from a malicious site. This can mislead users to adding a certificate exception for a different site than the perceived one. This can lead to compromised communications with the user perceived site through the MITM attack once the certificate exception has been added (CVE-2012-1964). Security researchers Mario Gomes and Soroush Dalili reported that since Mozilla allows the pseudo-protocol feed: to prefix any valid URL, it is possible to construct feed:javascript: URLs that will execute scripts in some contexts. On some sites it may be possible to use this to evade output filtering that would otherwise strip javascript: URLs and thus contribute to cross-site scripting (XSS) problems on these sites (CVE-2012-1965). Mozilla security researcher moz_bug_r_a4 reported a arbitrary code execution attack using a javascript: URL. The Gecko engine features a JavaScript sandbox utility that allows the browser or add-ons to safely execute script in the context of a web page. In certain cases, javascript: URLs are executed in such a sandbox with insufficient context that can allow those scripts to escape from the sandbox and run with elevated privilege. This can lead to arbitrary code execution (CVE-2012-1967). The mozilla firefox and thunderbird packages has been upgraded to the latest respective versions which is unaffected by these security flaws. Additionally the rootcerts packages has been upgraded to the latest version which brings updated root CA data. Update: Localization packages for firefox was missing with the MDVSA-2012:110 advisory and is being provided with this advisory. %description Localizations for Firefox web browser. %package krb5 krb5-pkinit-openssl krb5-server krb5-server-ldap krb5-workstation lib64krb53 lib64krb53-devel Update: Wed Aug 01 16:15:55 2012 Importance: security ID: MDVSA-2012:111 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:111 %pre A vulnerability has been discovered and corrected in krb5: The MIT krb5 KDC (Key Distribution Center) daemon can free an uninitialized pointer while processing an unusual AS-REQ, corrupting the process heap and possibly causing the daemon to abnormally terminate. An attacker could use this vulnerability to execute malicious code, but exploiting frees of uninitialized pointers to execute code is believed to be difficult. It is possible that a legitimate client that is misconfigured in an unusual way could trigger this vulnerability (CVE-2012-1015). The updated packages have been patched to correct this issue. %description Kerberos V5 is a trusted-third-party network authentication system, which can improve your network's security by eliminating the insecure practice of cleartext passwords. %package jpeg-progs lib64jpeg62 lib64jpeg8 lib64jpeg-devel lib64jpeg-static-devel Update: Wed Aug 01 20:44:14 2012 Importance: security ID: MDVSA-2012:121 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:121 %pre A vulnerability has been discovered and corrected in libjpeg-turbo: A Heap-based buffer overflow was found in the way libjpeg-turbo decompressed certain corrupt JPEG images in which the component count was erroneously set to a large value. An attacker could create a specially-crafted JPEG image that, when opened, could cause an application using libpng to crash or, possibly, execute arbitrary code with the privileges of the user running the application (CVE-2012-2806). The updated packages have been patched to correct this issue. %description This package contains a library of functions for manipulating JPEG images. It is a high-speed, libjpeg-compatible version for x86 and x86-64 processors which uses SIMD instructions (MMX, SSE2, etc.) to accelerate baseline JPEG compression and decompression. It is generally 2-4x as fast as the unmodified version of libjpeg, all else being equal. Install the libjpeg-turbo package if you need to manipulate JPEG files. You should also install the jpeg-progs package. %package icedtea-web icedtea-web-javadoc Update: Thu Aug 02 18:39:06 2012 Importance: security ID: MDVSA-2012:122 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:122 %pre Multiple vulnerabilities has been discovered and corrected in icedtea-web: An uninitialized pointer use flaw was found in IcedTea-Web web browser plugin. A malicious web page could use this flaw make IcedTea-Web browser plugin pass invalid pointer to a web browser. Depending on the browser used, it may cause the browser to crash or possibly execute arbitrary code (CVE-2012-3422). It was discovered that the IcedTea-Web web browser plugin incorrectly assumed that all strings provided by browser are NUL terminated, which is not guaranteed by the NPAPI (Netscape Plugin Application Programming Interface). When used in a browser that does not NUL terminate NPVariant NPStrings, this could lead to buffer over-read or over-write, resulting in possible information leak, crash, or code execution (CVE-2012-3423). The updated packages have been upgraded to the 1.1.6 version which is not affected by these issues. %description The IcedTea-Web project provides a Java web browser plugin, an implementation of Java Web Start (originally based on the Netx project) and a settings tool to manage deployment settings for the aforementioned plugin and Web Start implementations. %package lib64exttextcat0 lib64exttextcat-devel libexttextcat-tools libreoffice libreoffice-base libreoffice-calc libreoffice-common libreoffice-core libreoffice-devel libreoffice-devel-doc libreoffice-draw libreoffice-dtd-officedocument1.0 libreoffice-filter-binfilter libreoffice-gnome libreoffice-help-bg libreoffice-help-bn libreoffice-help-bs libreoffice-help-ca libreoffice-help-cs libreoffice-help-da libreoffice-help-de libreoffice-help-dz libreoffice-help-el libreoffice-help-en_GB libreoffice-help-en_US libreoffice-help-es libreoffice-help-et libreoffice-help-eu libreoffice-help-fi libreoffice-help-fr libreoffice-help-gl libreoffice-help-gu libreoffice-help-he libreoffice-help-hi libreoffice-help-hr libreoffice-help-hu libreoffice-help-it libreoffice-help-ja libreoffice-help-ko libreoffice-help-mk libreoffice-help-nb libreoffice-help-nl libreoffice-help-nn libreoffice-help-pl libreoffice-help-pt libreoffice-help-pt_BR libreoffice-help-ru libreoffice-help-si libreoffice-help-sk libreoffice-help-sl libreoffice-help-sv libreoffice-help-tr libreoffice-help-uk libreoffice-help-zh_CN libreoffice-help-zh_TW libreoffice-impress libreoffice-java-common libreoffice-kde4 libreoffice-l10n-af libreoffice-l10n-ar libreoffice-l10n-as libreoffice-l10n-bg libreoffice-l10n-bn libreoffice-l10n-br libreoffice-l10n-bs libreoffice-l10n-ca libreoffice-l10n-cs libreoffice-l10n-cy libreoffice-l10n-da libreoffice-l10n-de libreoffice-l10n-dz libreoffice-l10n-el libreoffice-l10n-en_GB libreoffice-l10n-es libreoffice-l10n-et libreoffice-l10n-eu libreoffice-l10n-fa libreoffice-l10n-fi libreoffice-l10n-fr libreoffice-l10n-ga libreoffice-l10n-gl libreoffice-l10n-gu libreoffice-l10n-he libreoffice-l10n-hi libreoffice-l10n-hr libreoffice-l10n-hu libreoffice-l10n-it libreoffice-l10n-ja libreoffice-l10n-kn libreoffice-l10n-ko libreoffice-l10n-lt libreoffice-l10n-lv libreoffice-l10n-mai libreoffice-l10n-mk libreoffice-l10n-ml libreoffice-l10n-mr libreoffice-l10n-nb libreoffice-l10n-nl libreoffice-l10n-nn libreoffice-l10n-nr libreoffice-l10n-nso libreoffice-l10n-or libreoffice-l10n-pa_IN libreoffice-l10n-pl libreoffice-l10n-pt libreoffice-l10n-pt_BR libreoffice-l10n-ro libreoffice-l10n-ru libreoffice-l10n-sh libreoffice-l10n-si libreoffice-l10n-sk libreoffice-l10n-sl libreoffice-l10n-sr libreoffice-l10n-ss libreoffice-l10n-st libreoffice-l10n-sv libreoffice-l10n-ta libreoffice-l10n-te libreoffice-l10n-th libreoffice-l10n-tn libreoffice-l10n-tr libreoffice-l10n-ts libreoffice-l10n-uk libreoffice-l10n-ve libreoffice-l10n-xh libreoffice-l10n-zh_CN libreoffice-l10n-zh_TW libreoffice-l10n-zu libreoffice-math libreoffice-openclipart libreoffice-pdfimport libreoffice-postgresql libreoffice-presentation-minimizer libreoffice-presenter-screen libreoffice-pyuno libreoffice-report-builder libreoffice-style-crystal libreoffice-style-galaxy libreoffice-style-hicontrast libreoffice-style-oxygen libreoffice-style-tango libreoffice-wiki-publisher libreoffice-writer Update: Sat Aug 04 08:56:32 2012 Importance: security ID: MDVSA-2012:123 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:123 %pre A Security issue was identified and fixed in libreoffice: Multiple heap-based buffer overflow flaws were found in the XML manifest encryption tag parsing code of LibreOffice. An attacker could create a specially-crafted file in the Open Document Format for Office Applications (ODF) format which when opened could cause arbitrary code execution (CVE-2012-2665). libreoffice for Mandriva Linux 2011 has been upgraded to the 3.5.5 version which is not vulnerable to this issue. %description LibreOffice is an Open Source, community-developed, multi-platform office productivity suite. It includes the key desktop applications, such as a word processor, spreadsheet, presentation manager, formula editing and drawing program, with a user interface and feature set similar to other office suites. Sophisticated and flexible, LibreOffice also works transparently with a variety of file formats, including Microsoft Office. %package dumpcap lib64wireshark1 lib64wireshark-devel rawshark tshark wireshark wireshark-tools Update: Mon Aug 06 12:54:33 2012 Importance: security ID: MDVSA-2012:125 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:125 %pre Multiple vulnerabilities was found and corrected in Wireshark: It may be possible to make Wireshark crash by injecting a malformed packet onto the wire or by convincing someone to read a malformed packet trace file (CVE-2012-4048). It may be possible to make Wireshark consume excessive CPU resources by injecting a malformed packet onto the wire or by convincing someone to read a malformed packet trace file (CVE-2012-4049). This advisory provides the latest versiona of Wireshark (1.4.14, 1.6.8) which is not vulnerable to these issues. %description Wireshark is a network traffic analyzer for Unix-ish operating systems. It is based on GTK+, a graphical user interface library, and libpcap, a packet capture and filtering library. Wireshark is a fork of Ethereal(tm) %package lib64xml2_2 lib64xml2-devel libxml2-python libxml2-utils Update: Wed Aug 08 10:43:35 2012 Importance: security ID: MDVSA-2012:126 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:126 %pre A vulnerability was found and corrected in libxml2: Multiple integer overflows in libxml2, on 64-bit Linux platforms allow remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors (CVE-2012-2807). The updated packages have been patched to correct this issue. %description This library allows you to manipulate XML files. It includes support for reading, modifying and writing XML and HTML files. There is DTDs support: this includes parsing and validation even with complex DtDs, either at parse time or later once the document has been modified. The output can be a simple SAX stream or and in-memory DOM-like representations. In this case one can use the built-in XPath and XPointer implementation to select subnodes or ranges. A flexible Input/Output mechanism is available, with existing HTTP and FTP modules and combined to a URI library. %package lib64tiff3 lib64tiff-devel lib64tiff-static-devel libtiff-progs Update: Wed Aug 08 11:46:50 2012 Importance: security ID: MDVSA-2012:127 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:127 %pre A vulnerability was found and corrected in libtiff: A heap-based buffer overflow flaw was found in the way tiff2pdf, a TIFF image to a PDF document conversion tool, of libtiff, a library of functions for manipulating TIFF (Tagged Image File Format) image format files, performed write of TIFF image content into particular PDF document file, when not properly initialized T2P context struct pointer has been provided by tiff2pdf (application requesting the conversion) as one of parameters for the routine performing the write. A remote attacker could provide a specially-crafted TIFF image format file, that when processed by tiff2pdf would lead to tiff2pdf executable crash or, potentially, arbitrary code execution with the privileges of the user running the tiff2pdf binary (CVE-2012-3401). The updated packages have been patched to correct this issue. %description The libtiff package contains a library of functions for manipulating TIFF (Tagged Image File Format) image format files. TIFF is a widely used file format for bitmapped images. TIFF files usually end in the .tif extension and they are often quite large. %package php-timezonedb Update: Thu Aug 09 11:53:30 2012 Importance: bugfix ID: MDVA-2012:052 URL: http://www.mandriva.com/security/advisories?name=MDVA-2012:052 %pre This is a maintenance and bugfix release that upgrades php-timezonedb to the latest version which provides the latest time zone data. %description This extension is a drop-in replacement for the builtin timezone database that comes with PHP. You should only install this extension in case you need to get a later version of the timezone database than the one that ships with PHP. The data that this extension uses comes from the "Olson" database, which is located at ftp://elsie.nci.nih.gov/pub/. %package bash bash-doc Update: Thu Aug 09 13:29:26 2012 Importance: security ID: MDVSA-2012:128 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:128 %pre A vulnerability was found and corrected in bash: A stack-based buffer overflow flaw was found in the way bash, the GNU Bourne Again shell, expanded certain /dev/fd file names when checking file names ('test' command) and evaluating /dev/fd file names in conditinal command expressions. A remote attacker could provide a specially-crafted Bash script that, when executed, would cause the bash executable to crash (CVE-2012-3410). Additionally the official patches 011 to 037 for bash-4.2 has been applied which resolves other issues found, including the CVE-2012-3410 vulnerability. %description Bash is a GNU project sh-compatible shell or command language interpreter. Bash (Bourne Again shell) incorporates useful features from the Korn shell (ksh) and the C shell (csh). Most sh scripts can be run by bash without modification. Bash offers several improvements over sh, including command line editing, unlimited size command history, job control, shell functions and aliases, indexed arrays of unlimited size and integer arithmetic in any base from two to 64. Bash is ultimately intended to conform to the IEEE POSIX P1003.2/ISO 9945.2 Shell and Tools standard. %package busybox busybox-static Update: Fri Aug 10 16:59:16 2012 Importance: security ID: MDVSA-2012:129 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:129 %pre Multiple vulnerabilities was found and corrected in busybox: The decompress function in ncompress allows remote attackers to cause a denial of service (crash), and possibly execute arbitrary code, via crafted data that leads to a buffer underflow (CVE-2006-1168). A missing DHCP option checking / sanitization flaw was reported for multiple DHCP clients. This flaw may allow DHCP server to trick DHCP clients to set e.g. system hostname to a specially crafted value containing shell special characters. Various scripts assume that hostname is trusted, which may lead to code execution when hostname is specially crafted (CVE-2011-2716). Additionally for Mandriva Enterprise Server 5 various problems in the ka-deploy and uClibc packages was discovered and fixed with this advisory. The updated packages have been patched to correct these issues. %description BusyBox combines tiny versions of many common UNIX utilities into a single small executable. It provides minimalist replacements for most of the utilities you usually find in GNU coreutils, shellutils, etc. The utilities in BusyBox generally have fewer options than their full-featured GNU cousins; however, the options that are included provide the expected functionality and behave very much like their GNU counterparts. BusyBox provides a fairly complete POSIX environment for any small or embedded system. BusyBox has been written with size-optimization and limited resources in mind. It is also extremely modular so you can easily include or exclude commands (or features) at compile time. This makes it easy to customize your embedded systems. To create a working system, just add /dev, /etc, and a kernel. %package busybox busybox-static Update: Fri Aug 10 17:25:50 2012 Importance: security ID: MDVSA-2012:129-1 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:129-1 %pre Multiple vulnerabilities was found and corrected in busybox: The decompress function in ncompress allows remote attackers to cause a denial of service (crash), and possibly execute arbitrary code, via crafted data that leads to a buffer underflow (CVE-2006-1168). A missing DHCP option checking / sanitization flaw was reported for multiple DHCP clients. This flaw may allow DHCP server to trick DHCP clients to set e.g. system hostname to a specially crafted value containing shell special characters. Various scripts assume that hostname is trusted, which may lead to code execution when hostname is specially crafted (CVE-2011-2716). Additionally for Mandriva Enterprise Server 5 various problems in the ka-deploy and uClibc packages was discovered and fixed with this advisory. The updated packages have been patched to correct these issues. Update: The wrong set of packages was sent out with the MDVSA-2012:129 advisory that lacked the fix for CVE-2006-1168. This advisory provides the correct packages. %description BusyBox combines tiny versions of many common UNIX utilities into a single small executable. It provides minimalist replacements for most of the utilities you usually find in GNU coreutils, shellutils, etc. The utilities in BusyBox generally have fewer options than their full-featured GNU cousins; however, the options that are included provide the expected functionality and behave very much like their GNU counterparts. BusyBox provides a fairly complete POSIX environment for any small or embedded system. BusyBox has been written with size-optimization and limited resources in mind. It is also extremely modular so you can easily include or exclude commands (or features) at compile time. This makes it easy to customize your embedded systems. To create a working system, just add /dev, /etc, and a kernel. %package lib64ldap2.4_2 lib64ldap2.4_2-devel lib64ldap2.4_2-static-devel openldap openldap-clients openldap-doc openldap-servers openldap-testprogs openldap-tests Update: Sat Aug 11 21:07:28 2012 Importance: security ID: MDVSA-2012:130 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:130 %pre A vulnerability was found and corrected in openldap: slapd in OpenLDAP before 2.4.30 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via an LDAP search query with attrsOnly set to true, which causes empty attributes to be returned (CVE-2012-1164). The updated packages have been patched to correct this issue. %description OpenLDAP is an open source suite of LDAP (Lightweight Directory Access Protocol) applications and development tools. The suite includes a stand-alone LDAP server (slapd) which is in the -servers package, libraries for implementing the LDAP protocol (in the lib packages), and utilities, tools, and sample clients (in the -clients package). The openldap binary package includes only configuration files used by the libraries. Install openldap if you need LDAP applications and tools. %package php-apc php-apc-admin Update: Mon Aug 13 12:03:58 2012 Importance: bugfix ID: MDVA-2012:053 URL: http://www.mandriva.com/security/advisories?name=MDVA-2012:053 %pre This is a maintenance and bugfix release that upgrades php-apc to the latest version which resolves various upstream bugs. %description APC was conceived of to provide a way of boosting the performance of PHP on heavily loaded sites by providing a way for scripts to be cached in a compiled state, so that the overhead of parsing and compiling can be almost completely eliminated. There are commercial products which provide this functionality, but they are neither open-source nor free. Our goal was to level the playing field by providing an implementation that allows greater flexibility and is universally accessible. NOTE!: php-apc has to be loaded last, very important! This package comes with four different flavours of APC (use only one of them): o apc-mmap.so - mmap (fcntl) based locks (default) o apc-sem.so - IPC semamphore based locks o apc-spinlocks.so - Hardware-dependent implementation of spinlocks o apc-pthread.so - NPTL pthread mutex based locks o apc-mmap+mutex.so - mmap (fcntl) and pthread mutex based locks %package lib64otr2 lib64otr-devel libotr-utils Update: Mon Aug 13 16:23:23 2012 Importance: security ID: MDVSA-2012:131 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:131 %pre A vulnerability was found and corrected in libotr: Just Ferguson discovered that libotr, an off-the-record (OTR) messaging library, can be forced to perform zero-length allocations for heap buffers that are used in base64 decoding routines. An attacker can exploit this flaw by sending crafted messages to an application that is using libotr to perform denial of service attacks or potentially execute arbitrary code (CVE-2012-3461). The updated packages have been patched to correct this issue. %description libotr is a library and toolkit which implements Off-the-Record (OTR) Messaging. OTR allows you to have private conversations over IM by providing: - Encryption - No one else can read your instant messages. - Authentication - You are assured the correspondent is who you think it is. - Deniability - The messages you send do _not_ have digital signatures that are checkable by a third party. Anyone can forge messages after a conversation to make them look like they came from you. However, _during_ a conversation, your correspondent is assured the messages he sees are authentic and unmodified. - Perfect forward secrecy - If you lose control of your private keys, no previous conversation is compromised. %package lib64usbmuxd1 lib64usbmuxd-devel usbmuxd Update: Thu Aug 16 09:02:51 2012 Importance: security ID: MDVSA-2012:133 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:133 %pre It was discovered that usbmuxd did not correctly perform bounds checking when processing the SerialNumber field of USB devices. An attacker with physical access could use this to crash usbmuxd or potentially execute arbitrary code as the 'usbmux' user (CVE-2012-0065). The updated packages have been patched to correct this issue. %description usbmuxd is a daemon used for communicating with Apple's iPod Touch and iPhone devices. It allows multiple services on the device to be accessed simultaneously. %package dumpcap lib64wireshark1 lib64wireshark-devel rawshark tshark wireshark wireshark-tools Update: Thu Aug 16 16:00:46 2012 Importance: security ID: MDVSA-2012:134 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:134 %pre Multiple vulnerabilities was found and corrected in Wireshark: The DCP ETSI dissector could trigger a zero division (CVE-2012-4285). The MongoDB dissector could go into a large loop (CVE-2012-4287). The XTP dissector could go into an infinite loop (CVE-2012-4288). The AFP dissector could go into a large loop (CVE-2012-4289). The RTPS2 dissector could overflow a buffer (CVE-2012-4296). The GSM RLC MAC dissector could overflow a buffer (CVE-2012-4297). The CIP dissector could exhaust system memory (CVE-2012-4291). The STUN dissector could crash (CVE-2012-4292). The EtherCAT Mailbox dissector could abort (CVE-2012-4293). The CTDB dissector could go into a large loop (CVE-2012-4290). This advisory provides the latest version of Wireshark (1.6.10) which is not vulnerable to these issues. %description Wireshark is a network traffic analyzer for Unix-ish operating systems. It is based on GTK+, a graphical user interface library, and libpcap, a packet capture and filtering library. Wireshark is a fork of Ethereal(tm) %package acpid Update: Fri Aug 17 08:36:29 2012 Importance: security ID: MDVSA-2012:137 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:137 %pre Multiple vulnerabilities has been discovered and corrected in acpid: Oliver-Tobias Ripka discovered that an ACPI script incorrectly handled power button events. A local attacker could use this to execute arbitrary code, and possibly escalate privileges (CVE-2011-2777). Helmut Grohne and Michael Biebl discovered that ACPI scripts were executed with a permissive file mode creation mask (umask). A local attacker could read files and modify directories created by ACPI scripts that did not set a strict umask (CVE-2011-4578). The updated packages have been patched to correct these issues. %description The ACPI specification defines power and system management functions for each computer, in a generic manner. The ACPI daemon coordinates the management of power and system functions when ACPI kernel support is enabled (kernel 2.3.x or later). %package php-apc php-apc-admin Update: Fri Aug 17 11:30:07 2012 Importance: bugfix ID: MDVA-2012:054 URL: http://www.mandriva.com/security/advisories?name=MDVA-2012:054 %pre This is a maintenance and bugfix release that upgrades php-apc to the latest version (3.1.12) which resolves various upstream bugs. %description APC was conceived of to provide a way of boosting the performance of PHP on heavily loaded sites by providing a way for scripts to be cached in a compiled state, so that the overhead of parsing and compiling can be almost completely eliminated. There are commercial products which provide this functionality, but they are neither open-source nor free. Our goal was to level the playing field by providing an implementation that allows greater flexibility and is universally accessible. NOTE!: php-apc has to be loaded last, very important! This package comes with four different flavours of APC (use only one of them): o apc-mmap.so - mmap (fcntl) based locks (default) o apc-sem.so - IPC semamphore based locks o apc-spinlocks.so - Hardware-dependent implementation of spinlocks o apc-pthread.so - NPTL pthread mutex based locks o apc-mmap+mutex.so - mmap (fcntl) and pthread mutex based locks %package lib64ecpg9.0_6 lib64pq9.0_5 postgresql9.0 postgresql9.0-contrib postgresql9.0-devel postgresql9.0-docs postgresql9.0-pl postgresql9.0-plperl postgresql9.0-plpgsql postgresql9.0-plpython postgresql9.0-pltcl postgresql9.0-server Update: Sun Aug 19 11:20:30 2012 Importance: security ID: MDVSA-2012:139 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:139 %pre Multiple vulnerabilities has been discovered and corrected in postgresql: Prevent access to external files/URLs via contrib/xml2's xslt_process() (Peter Eisentraut). libxslt offers the ability to read and write both files and URLs through stylesheet commands, thus allowing unprivileged database users to both read and write data with the privileges of the database server. Disable that through proper use of libxslt's security options (CVE-2012-3488). Also, remove xslt_process()'s ability to fetch documents and stylesheets from external files/URLs. While this was a documented feature, it was long regarded as a bad idea. The fix for CVE-2012-3489 broke that capability, and rather than expend effort on trying to fix it, we're just going to summarily remove it. Prevent access to external files/URLs via XML entity references (Noah Misch, Tom Lane). xml_parse() would attempt to fetch external files or URLs as needed to resolve DTD and entity references in an XML value, thus allowing unprivileged database users to attempt to fetch data with the privileges of the database server. While the external data wouldn't get returned directly to the user, portions of it could be exposed in error messages if the data didn't parse as valid XML; and in any case the mere ability to check existence of a file might be useful to an attacker (CVE-2012-3489). This advisory provides the latest versions of PostgreSQL that is not vulnerable to these issues. %description PostgreSQL is an advanced Object-Relational database management system (DBMS) that supports almost all SQL constructs (including transactions, subselects and user-defined types and functions). The postgresql package includes the client programs and libraries that you'll need to access a PostgreSQL DBMS server. These PostgreSQL client programs are programs that directly manipulate the internal structure of PostgreSQL databases on a PostgreSQL server. These client programs can be located on the same machine with the PostgreSQL server, or may be on a remote machine which accesses a PostgreSQL server over a network connection. This package contains the client libraries for C and C++, as well as command-line utilities for managing PostgreSQL databases on a PostgreSQL server. If you want to manipulate a PostgreSQL database on a remote PostgreSQL server, you need this package. You also need to install this package if you're installing the postgresql-server package. %package apache-mod_php lib64php5_common5 php-bcmath php-bz2 php-calendar php-cgi php-cli php-ctype php-curl php-dba php-devel php-doc php-dom php-enchant php-exif php-fileinfo php-filter php-fpm php-ftp php-gd php-gettext php-gmp php-hash php-iconv php-imap php-ini php-intl php-json php-ldap php-mbstring php-mcrypt php-mssql php-mysql php-mysqli php-mysqlnd php-odbc php-openssl php-pcntl php-pdo php-pdo_dblib php-pdo_mysql php-pdo_odbc php-pdo_pgsql php-pdo_sqlite php-pgsql php-phar php-posix php-pspell php-readline php-recode php-session php-shmop php-snmp php-soap php-sockets php-sqlite3 php-sqlite php-sybase_ct php-sysvmsg php-sysvsem php-sysvshm php-tidy php-tokenizer php-wddx php-xml php-xmlreader php-xmlrpc php-xmlwriter php-xsl php-zip php-zlib Update: Sun Aug 19 12:30:11 2012 Importance: bugfix ID: MDVA-2012:055 URL: http://www.mandriva.com/security/advisories?name=MDVA-2012:055 %pre This is a maintenance and bugfix release that upgrades php to the latest 5.3.16 version which resolves numerous upstream bugs in php. %description PHP5 is an HTML-embeddable scripting language. PHP5 offers built-in database integration for several commercial and non-commercial database management systems, so writing a database-enabled script with PHP5 is fairly simple. The most common use of PHP5 coding is probably as a replacement for CGI scripts. This version of php has the suhosin patch 0.9.10 applied. Please report bugs here: http://qa.mandriva.com/ so that the official maintainer of this Mandriva package can help you. More information regarding the suhosin patch 0.9.10 here: http://www.suhosin.org/ %package lib64mono0 lib64mono2.0_1 lib64mono-devel mono-2.0 mono mono-4.0 mono-compat mono-data-2.0 mono-data mono-data-4.0 mono-data-compat mono-doc monodoc-core mono-extras-2.0 mono-extras mono-extras-4.0 mono-extras-compat mono-locale-extras-2.0 mono-locale-extras mono-locale-extras-4.0 mono-locale-extras-compat mono-nunit mono-wcf-2.0 mono-wcf mono-wcf-4.0 mono-web-2.0 mono-web mono-web-4.0 mono-web-compat mono-winforms-2.0 mono-winforms mono-winforms-4.0 mono-winforms-compat mono-winfxcore-2.0 mono-winfxcore mono-winfxcore-4.0 Update: Mon Aug 20 11:56:55 2012 Importance: security ID: MDVSA-2012:140 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:140 %pre A vulnerability has been discovered and corrected in mono: Cross-site scripting (XSS) vulnerability in the ProcessRequest function in mcs/class/System.Web/System.Web/HttpForbiddenHandler.cs in Mono 2.10.8 and earlier allows remote attackers to inject arbitrary web script or HTML via a file with a crafted name and a forbidden extension, which is not properly handled in an error message (CVE-2012-3382). The updated packages have been patched to correct this issue. %description Mono is an implementation of the ECMA Common Language Infrastructure, it contains both a just-in-time compiler for maximum performance, and an interpeter. It can also be used to run programs from the .NET Framework. This package contains the core of the Mono runtime including its Virtual Machine, Just-in-time compiler, C# compiler, security tools and libraries (corlib, XML, System.Security, System.Drawing, ZipLib, I18N, Cairo and Mono.*). %package lib64openslp1 lib64openslp1-devel openslp Update: Tue Aug 21 09:11:29 2012 Importance: security ID: MDVSA-2012:141 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:141 %pre A vulnerability has been discovered and corrected in openslp: The extension parser in slp_v2message.c in OpenSLP 1.2.1 allows remote attackers to cause a denial of service (infinite loop) via a packet with a next extension offset that references this extension or a previous extension (CVE-2010-3609). The updated packages have been patched to correct this issue. %description Service Location Protocol is an IETF standards track protocol that provides a framework to allow networking applications to discover the existence, location, and configuration of networked services in enterprise networks. OpenSLP is an open source implementation of the SLPv2 protocol as defined by RFC 2608 and RFC 2614. This package include the daemon, libraries, header files and documentation %package gimp gimp-python lib64gimp2.0_0 lib64gimp2.0-devel Update: Tue Aug 21 14:43:53 2012 Importance: security ID: MDVSA-2012:142 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:142 %pre Multiple vulnerabilities has been discovered and corrected in gimp: A heap-based buffer overflow flaw, leading to invalid free, was found in the way KISS CEL file format plug-in of Gimp, the GNU Image Manipulation Program, performed loading of certain palette files. A remote attacker could provide a specially-crafted KISS palette file that, when opened in Gimp would cause the CEL plug-in to crash or, potentially, execute arbitrary code with the privileges of the user running the gimp executable (CVE-2012-3403). Integer overflow, leading to heap-based buffer overflow flaw was found in the GIMP's GIF (Graphics Interchange Format) image file plug-in. An attacker could create a specially-crafted GIF image file that, when opened, could cause the GIF plug-in to crash or, potentially, execute arbitrary code with the privileges of the user running the GIMP (CVE-2012-3481). The updated gimp packages have been upgraded to the 2.6.12 version and patched to correct these issues. Additionally for Mandriva Enterprise server 5 the gegl packages was upgraded to the 0.0.22 version and rebuilt for ffmpeg 0.5.9, the enscript packages was added because of a build dependency, the gutenprint and mtink packages was rebuilt against the gimp 2.6.12 libraries. %description The GIMP is an image manipulation program suitable for photo retouching, image composition and image authoring. Many people find it extremely useful in creating logos and other graphics for web pages. The GIMP has many of the tools and filters you would expect to find in similar commercial offerings, and some interesting extras as well. The GIMP provides a large image manipulation toolbox, including channel operations and layers, effects, sub-pixel imaging and anti-aliasing, and conversions, all with multi-level undo. This version of The GIMP includes a scripting facility, but many of the included scripts rely on fonts that we cannot distribute. The GIMP ftp site has a package of fonts that you can install by yourself, which includes all the fonts needed to run the included scripts. Some of the fonts have unusual licensing requirements; all the licenses are documented in the package. Get them in ftp://ftp.gimp.org/pub/gimp/fonts/ if you are so inclined. Alternatively, choose fonts which exist on your system before running the scripts. Build Options: --without python Disable pygimp (default enabled) --with lzw Enable LZW compression in GIF (default disabled) %package python-django Update: Thu Aug 23 15:19:14 2012 Importance: security ID: MDVSA-2012:143 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:143 %pre Multiple vulnerabilities has been discovered and corrected in python-django: The (1) django.http.HttpResponseRedirect and (2) django.http.HttpResponsePermanentRedirect classes in Django before 1.3.2 and 1.4.x before 1.4.1 do not validate the scheme of a redirect target, which might allow remote attackers to conduct cross-site scripting (XSS) attacks via a data: URL (CVE-2012-3442). The django.forms.ImageField class in the form system in Django before 1.3.2 and 1.4.x before 1.4.1 completely decompresses image data during image validation, which allows remote attackers to cause a denial of service (memory consumption) by uploading an image file (CVE-2012-3443). The get_image_dimensions function in the image-handling functionality in Django before 1.3.2 and 1.4.x before 1.4.1 uses a constant chunk size in all attempts to determine dimensions, which allows remote attackers to cause a denial of service (process or thread consumption) via a large TIFF image (CVE-2012-3444). The updated packages have been upgraded to the 1.3.3 version which is not vulnerable to these issues. %description Django is a high-level Python Web framework that encourages rapid development and clean, pragmatic design. Developed and used over the past two years by a fast-moving online-news operation, Django was designed from scratch to handle two challenges: the intensive deadlines of a newsroom and the stringent requirements of experienced Web developers. It has convenient niceties for developing content-management systems, but it's an excellent tool for building any Web site. Django focuses on automating as much as possible and adhering to the DRY principle. %package firefox firefox-af firefox-ar firefox-ast firefox-be firefox-bg firefox-bn_BD firefox-bn_IN firefox-br firefox-bs firefox-ca firefox-cs firefox-cy firefox-da firefox-de firefox-devel firefox-el firefox-en_GB firefox-en_ZA firefox-eo firefox-es_AR firefox-es_CL firefox-es_ES firefox-es_MX firefox-et firefox-eu firefox-fa firefox-fi firefox-fr firefox-fy firefox-ga_IE firefox-gd firefox-gl firefox-gu_IN firefox-he firefox-hi firefox-hr firefox-hu firefox-hy firefox-id firefox-is firefox-it firefox-ja firefox-kk firefox-kn firefox-ko firefox-ku firefox-lg firefox-lt firefox-lv firefox-mai firefox-mk firefox-ml firefox-mr firefox-nb_NO firefox-nl firefox-nn_NO firefox-nso firefox-or firefox-pa_IN firefox-pl firefox-pt_BR firefox-pt_PT firefox-ro firefox-ru firefox-si firefox-sk firefox-sl firefox-sq firefox-sr firefox-sv_SE firefox-ta firefox-ta_LK firefox-te firefox-th firefox-tr firefox-uk firefox-vi firefox-zh_CN firefox-zh_TW firefox-zu icedtea-web icedtea-web-javadoc lib64sqlite3_0 lib64sqlite3-devel lib64sqlite3-static-devel lib64xulrunner15.0 lib64xulrunner-devel sqlite3-tools xulrunner Update: Wed Aug 29 09:46:57 2012 Importance: security ID: MDVSA-2012:145 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:145 %pre Security issues were identified and fixed in mozilla firefox: Mozilla developers identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these bugs showed evidence of memory corruption under certain circumstances, and we presume that with enough effort at least some of these could be exploited to run arbitrary code (CVE-2012-1971). Security researcher Abhishek Arya (Inferno) of Google Chrome Security Team discovered a series of use-after-free issues using the Address Sanitizer tool. Many of these issues are potentially exploitable, allowing for remote code execution (CVE-2012-1972, CVE-2012-1973, CVE-2012-1974, CVE-2012-1975, CVE-2012-1976, CVE-2012-3956, CVE-2012-3957, CVE-2012-3958, CVE-2012-3959, CVE-2012-3960, CVE-2012-3961, CVE-2012-3962, CVE-2012-3963, CVE-2012-3964). Security researcher Mariusz Mlynski reported that it is possible to shadow the location object using Object.defineProperty. This could be used to confuse the current location to plugins, allowing for possible cross-site scripting (XSS) attacks (CVE-2012-1956). Security researcher Mariusz Mlynski reported that when a page opens a new tab, a subsequent window can then be opened that can be navigated to about:newtab, a chrome privileged page. Once about:newtab is loaded, the special context can potentially be used to escalate privilege, allowing for arbitrary code execution on the local system in a maliciously crafted attack (CVE-2012-3965). Security researcher Frederic Hoguin reported two related issues with the decoding of bitmap (.BMP) format images embedded in icon (.ICO) format files. When processing a negative height header value for the bitmap image, a memory corruption can be induced, allowing an attacker to write random memory and cause a crash. This crash may be potentially exploitable (CVE-2012-3966). Security researcher miaubiz used the Address Sanitizer tool to discover two WebGL issues. The first issue is a use-after-free when WebGL shaders are called after being destroyed. The second issue exposes a problem with Mesa drivers on Linux, leading to a potentially exploitable crash (CVE-2012-3968, CVE-2012-3967). Security researcher Arthur Gerkis used the Address Sanitizer tool to find two issues involving Scalable Vector Graphics (SVG) files. The first issue is a buffer overflow in Gecko's SVG filter code when the sum of two values is too large to be stored as a signed 32-bit integer, causing the function to write past the end of an array. The second issue is a use-after-free when an element with a requiredFeatures attribute is moved between documents. In that situation, the internal representation of the requiredFeatures value could be freed prematurely. Both issues are potentially exploitable (CVE-2012-3969, CVE-2012-3970). Using the Address Sanitizer tool, Mozilla security researcher Christoph Diehl discovered two memory corruption issues involving the Graphite 2 library used in Mozilla products. Both of these issues can cause a potentially exploitable crash. These problems were fixed in the Graphite 2 library, which has been updated for Mozilla products (CVE-2012-3971). Security research Nicolas Gregoire used the Address Sanitizer tool to discover an out-of-bounds read in the format-number feature of XSLT, which can cause inaccurate formatting of numbers and information leakage. This is not directly exploitable (CVE-2012-3972). Mozilla security researcher Mark Goodwin discovered an issue with the Firefox developer tools' debugger. If remote debugging is disabled, but the experimental HTTPMonitor extension has been installed and enabled, a remote user can connect to and use the remote debugging service through the port used by HTTPMonitor. A remote-enabled flag has been added to resolve this problem and close the port unless debugging is explicitly enabled (CVE-2012-3973). Security researcher Masato Kinugawa reported that if a crafted executable is placed in the root partition on a Windows file system, the Firefox and Thunderbird installer will launch this program after a standard installation instead of Firefox or Thunderbird, running this program with the user's privileges (CVE-2012-3974). Security researcher vsemozhetbyt reported that when the DOMParser is used to parse text/html data in a Firefox extension, linked resources within this HTML data will be loaded. If the data being parsed in the extension is untrusted, it could lead to information leakage and can potentially be combined with other attacks to become exploitable (CVE-2012-3975). Security researcher Mark Poticha reported an issue where incorrect SSL certificate information can be displayed on the addressbar, showing the SSL data for a previous site while another has been loaded. This is caused by two onLocationChange events being fired out of the expected order, leading to the displayed certificate data to not be updated. This can be used for phishing attacks by allowing the user to input form or other data on a newer, attacking, site while the credentials of an older site appear on the addressbar (CVE-2012-3976). Mozilla security researcher moz_bug_r_a4 reported that certain security checks in the location object can be bypassed if chrome code is called content in a specific manner. This allowed for the loading of restricted content. This can be combined with other issues to become potentially exploitable (CVE-2012-3978). Security researcher Colby Russell discovered that eval in the web console can execute injected code with chrome privileges, leading to the running of malicious code in a privileged context. This allows for arbitrary code execution through a malicious web page if the web console is invoked by the user (CVE-2012-3980). The mozilla firefox packages has been upgraded to the latest versions which is unaffected by these security flaws. Additionally the sqlite3 packages has been upgraded to the 3.7.13 version as firefox 15.0 requires the 3.7.12.1+ version. %description XULRunner is a Mozilla runtime package that can be used to bootstrap XUL+XPCOM applications that are as rich as Firefox and Thunderbird. It will provide mechanisms for installing, upgrading, and uninstalling these applications. XULRunner will also provide libxul, a solution which allows the embedding of Mozilla technologies in other projects and products. %package mozilla-thunderbird mozilla-thunderbird-ar mozilla-thunderbird-be mozilla-thunderbird-bg mozilla-thunderbird-bn_BD mozilla-thunderbird-br mozilla-thunderbird-ca mozilla-thunderbird-cs mozilla-thunderbird-da mozilla-thunderbird-de mozilla-thunderbird-el mozilla-thunderbird-en_GB mozilla-thunderbird-enigmail mozilla-thunderbird-enigmail-ar mozilla-thunderbird-enigmail-ca mozilla-thunderbird-enigmail-cs mozilla-thunderbird-enigmail-de mozilla-thunderbird-enigmail-el mozilla-thunderbird-enigmail-es mozilla-thunderbird-enigmail-fi mozilla-thunderbird-enigmail-fr mozilla-thunderbird-enigmail-it mozilla-thunderbird-enigmail-ja mozilla-thunderbird-enigmail-ko mozilla-thunderbird-enigmail-nb mozilla-thunderbird-enigmail-nl mozilla-thunderbird-enigmail-pl mozilla-thunderbird-enigmail-pt mozilla-thunderbird-enigmail-pt_BR mozilla-thunderbird-enigmail-ru mozilla-thunderbird-enigmail-sl mozilla-thunderbird-enigmail-sv mozilla-thunderbird-enigmail-tr mozilla-thunderbird-enigmail-vi mozilla-thunderbird-enigmail-zh_CN mozilla-thunderbird-enigmail-zh_TW mozilla-thunderbird-es_AR mozilla-thunderbird-es_ES mozilla-thunderbird-et mozilla-thunderbird-eu mozilla-thunderbird-fi mozilla-thunderbird-fr mozilla-thunderbird-fy mozilla-thunderbird-ga mozilla-thunderbird-gd mozilla-thunderbird-gl mozilla-thunderbird-he mozilla-thunderbird-hu mozilla-thunderbird-id mozilla-thunderbird-is mozilla-thunderbird-it mozilla-thunderbird-ja mozilla-thunderbird-ko mozilla-thunderbird-lightning mozilla-thunderbird-lt mozilla-thunderbird-nb_NO mozilla-thunderbird-nl mozilla-thunderbird-nn_NO mozilla-thunderbird-pl mozilla-thunderbird-pt_BR mozilla-thunderbird-pt_PT mozilla-thunderbird-ro mozilla-thunderbird-ru mozilla-thunderbird-si mozilla-thunderbird-sk mozilla-thunderbird-sl mozilla-thunderbird-sq mozilla-thunderbird-sv_SE mozilla-thunderbird-ta_LK mozilla-thunderbird-tr mozilla-thunderbird-uk mozilla-thunderbird-vi mozilla-thunderbird-zh_CN mozilla-thunderbird-zh_TW nsinstall Update: Wed Aug 29 13:15:07 2012 Importance: security ID: MDVSA-2012:147 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:147 %pre Security issues were identified and fixed in mozilla thunderbird: Mozilla developers identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these bugs showed evidence of memory corruption under certain circumstances, and we presume that with enough effort at least some of these could be exploited to run arbitrary code (CVE-2012-1971). In general these flaws cannot be exploited through email in the Thunderbird and SeaMonkey products because scripting is disabled, but are potentially a risk in browser or browser-like contexts in those products (CVE-2012-1970). Security researcher Abhishek Arya (Inferno) of Google Chrome Security Team discovered a series of use-after-free issues using the Address Sanitizer tool. Many of these issues are potentially exploitable, allowing for remote code execution (CVE-2012-1972, CVE-2012-1973, CVE-2012-1974, CVE-2012-1975, CVE-2012-1976, CVE-2012-3956, CVE-2012-3957, CVE-2012-3958, CVE-2012-3959, CVE-2012-3960, CVE-2012-3961, CVE-2012-3962, CVE-2012-3963, CVE-2012-3964). Security researcher Mariusz Mlynski reported that it is possible to shadow the location object using Object.defineProperty. This could be used to confuse the current location to plugins, allowing for possible cross-site scripting (XSS) attacks (CVE-2012-1956). Security researcher Frederic Hoguin reported two related issues with the decoding of bitmap (.BMP) format images embedded in icon (.ICO) format files. When processing a negative height header value for the bitmap image, a memory corruption can be induced, allowing an attacker to write random memory and cause a crash. This crash may be potentially exploitable (CVE-2012-3966). Security researcher miaubiz used the Address Sanitizer tool to discover two WebGL issues. The first issue is a use-after-free when WebGL shaders are called after being destroyed. The second issue exposes a problem with Mesa drivers on Linux, leading to a potentially exploitable crash (CVE-2012-3968, CVE-2012-3967). Security researcher Arthur Gerkis used the Address Sanitizer tool to find two issues involving Scalable Vector Graphics (SVG) files. The first issue is a buffer overflow in Gecko's SVG filter code when the sum of two values is too large to be stored as a signed 32-bit integer, causing the function to write past the end of an array. The second issue is a use-after-free when an element with a requiredFeatures attribute is moved between documents. In that situation, the internal representation of the requiredFeatures value could be freed prematurely. Both issues are potentially exploitable (CVE-2012-3969, CVE-2012-3970). Using the Address Sanitizer tool, Mozilla security researcher Christoph Diehl discovered two memory corruption issues involving the Graphite 2 library used in Mozilla products. Both of these issues can cause a potentially exploitable crash. These problems were fixed in the Graphite 2 library, which has been updated for Mozilla products (CVE-2012-3971). Security research Nicolas Gregoire used the Address Sanitizer tool to discover an out-of-bounds read in the format-number feature of XSLT, which can cause inaccurate formatting of numbers and information leakage. This is not directly exploitable (CVE-2012-3972). Security researcher Masato Kinugawa reported that if a crafted executable is placed in the root partition on a Windows file system, the Firefox and Thunderbird installer will launch this program after a standard installation instead of Firefox or Thunderbird, running this program with the user's privileges (CVE-2012-3974). Security researcher vsemozhetbyt reported that when the DOMParser is used to parse text/html data in a Firefox extension, linked resources within this HTML data will be loaded. If the data being parsed in the extension is untrusted, it could lead to information leakage and can potentially be combined with other attacks to become exploitable (CVE-2012-3975). Mozilla security researcher moz_bug_r_a4 reported that certain security checks in the location object can be bypassed if chrome code is called content in a specific manner. This allowed for the loading of restricted content. This can be combined with other issues to become potentially exploitable (CVE-2012-3978). Security researcher Colby Russell discovered that eval in the web console can execute injected code with chrome privileges, leading to the running of malicious code in a privileged context. This allows for arbitrary code execution through a malicious web page if the web console is invoked by the user (CVE-2012-3980). The mozilla thunderbird packages has been upgraded to the latest version which is unaffected by these security flaws. %description Mozilla Thunderbird is a full-featured email, RSS and newsgroup client that makes emailing safer, faster and easier than ever before. %package lib64mysql18 lib64mysqld0 lib64mysql-devel lib64mysqlservices0 lib64mysql-static-devel mysql mysql-bench mysql-client mysql-common mysql-common-core mysql-core Update: Thu Aug 30 11:39:36 2012 Importance: bugfix ID: MDVA-2012:056 URL: http://www.mandriva.com/security/advisories?name=MDVA-2012:056 %pre This is a maintenance and bugfix release that upgrades mysql to the latest version which resolves various upstream bugs. %description The MySQL(TM) software delivers a very fast, multi-threaded, multi-user, and robust SQL (Structured Query Language) database server. MySQL Server is intended for mission-critical, heavy-load production systems as well as for embedding into mass-deployed software. MySQL is a trademark of MySQL AB. The mysql server is compiled with the following storage engines: - InnoDB Storage Engine - Archive Storage Engine - CSV Storage Engine - Federated Storage Engine - User Defined Functions (UDFs). - Blackhole Storage Engine - Partition Storage Engine - Perfschema Storage Engine %package ffmpeg lib64avfilter1 lib64avformats52 lib64avutil50 lib64ffmpeg52 lib64ffmpeg-devel lib64ffmpeg-static-devel lib64postproc51 lib64swscaler0 Update: Thu Aug 30 14:26:46 2012 Importance: security ID: MDVSA-2012:148 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:148 %pre Multiple vulnerabilities has been found and corrected in ffmpeg. This advisory provides updated versions which resolves various security issues. %description ffmpeg is a hyper fast realtime audio/video encoder, a streaming server and a generic audio and video file converter. It can grab from a standard Video4Linux video source and convert it into several file formats based on DCT/motion compensation encoding. Sound is compressed in MPEG audio layer 2 or using an AC3 compatible stream. %package lib64nspr4 lib64nspr-devel lib64nss3 lib64nss-devel lib64nss-static-devel nss Update: Fri Aug 31 16:41:35 2012 Importance: bugfix ID: MDVA-2012:057 URL: http://www.mandriva.com/security/advisories?name=MDVA-2012:057 %pre This is a maintenance and bugfix release that upgrades the Mozilla NSPR and NSS packages to the latest versions which resolves various upstream bugs. %description Network Security Services (NSS) is a set of libraries designed to support cross-platform development of security-enabled client and server applications. Applications built with NSS can support SSL v2 and v3, TLS, PKCS #5, PKCS #7, PKCS #11, PKCS #12, S/MIME, X.509 v3 certificates, and other security standards. For detailed information on standards supported, see http://www.mozilla.org/projects/security/pki/nss/overview.html. %package fetchmail fetchmailconf fetchmail-daemon Update: Sat Sep 01 12:59:46 2012 Importance: security ID: MDVSA-2012:149 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:149 %pre Multiple vulnerabilities has been found and corrected in fetchmail: Fetchmail version 6.3.9 enabled all SSL workarounds (SSL_OP_ALL) which contains a switch to disable a countermeasure against certain attacks against block ciphers that permit guessing the initialization vectors, providing that an attacker can make the application (fetchmail) encrypt some data for him -- which is not easily the case (aka a BEAST attack) (CVE-2011-3389). A denial of service flaw was found in the way Fetchmail, a remote mail retrieval and forwarding utility, performed base64 decoding of certain NTLM server responses. Upon sending the NTLM authentication request, Fetchmail did not check if the received response was actually part of NTLM protocol exchange, or server-side error message and session abort. A rogue NTML server could use this flaw to cause fetchmail executable crash (CVE-2012-3482). This advisory provides the latest version of fetchmail (6.3.22) which is not vulnerable to these issues. %description Fetchmail is a free, full-featured, robust, and well-documented remote mail retrieval and forwarding utility intended to be used over on-demand TCP/IP links (such as SLIP or PPP connections). It retrieves mail from remote mail servers and forwards it to your local (client) machine's delivery system, so it can then be read by normal mail user agents such as Mutt, Elm, Pine, (X)Emacs/Gnus or Mailx. It comes with an interactive GUI configurator suitable for end-users. Fetchmail supports every remote-mail protocol currently in use on the Internet (POP2, POP3, RPOP, APOP, KPOP, all IMAPs, ESMTP ETRN) for retrieval. Then Fetchmail forwards the mail through SMTP, so you can read it through your normal mail client. %package iptables lib64ip4tc0 lib64ip4tc-devel lib64ip6tc0 lib64ip6tc-devel lib64ipq0 lib64ipq-devel lib64iptables7 lib64iptables-devel lib64iptc0 lib64iptc-devel Update: Mon Sep 03 14:08:47 2012 Importance: bugfix ID: MDVA-2012:058 URL: http://www.mandriva.com/security/advisories?name=MDVA-2012:058 %pre It was discovered that the statistic module in iptables-1.4.12 did not work (due to a linkage problem). This advisory provides iptables-1.4.12.2 where this has been fixed. %description iptables controls the Linux kernel network packet filtering code. It allows you to set up firewalls and IP masquerading, etc. Install iptables if you need to set up firewalling for your network. %package iptables lib64ip4tc0 lib64ip4tc-devel lib64ip6tc0 lib64ip6tc-devel lib64ipq0 lib64ipq-devel lib64iptables7 lib64iptables-devel lib64iptc0 lib64iptc-devel Update: Mon Sep 03 14:09:33 2012 Importance: bugfix ID: MDVA-2012:058 URL: http://www.mandriva.com/security/advisories?name=MDVA-2012:058 %pre It was discovered that the statistic module in iptables-1.4.12 did not work (due to a linkage problem). This advisory provides iptables-1.4.12.2 where this has been fixed. %description iptables controls the Linux kernel network packet filtering code. It allows you to set up firewalls and IP masquerading, etc. Install iptables if you need to set up firewalling for your network. %package apache-base apache-conf apache-devel apache-doc apache-htcacheclean apache-mod_authn_dbd apache-mod_cache apache-mod_dav apache-mod_dbd apache-mod_deflate apache-mod_disk_cache apache-mod_file_cache apache-mod_ldap apache-mod_mem_cache apache-mod_proxy apache-mod_proxy_ajp apache-mod_proxy_scgi apache-mod_reqtimeout apache-mod_ssl apache-mod_suexec apache-modules apache-mod_userdir apache-mpm-event apache-mpm-itk apache-mpm-peruser apache-mpm-prefork apache-mpm-worker apache-source Update: Mon Oct 01 16:58:07 2012 Importance: security ID: MDVSA-2012:154-1 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:154-1 %pre Multiple vulnerabilities has been found and corrected in apache (ASF HTTPD): Insecure handling of LD_LIBRARY_PATH was found that could lead to the current working directory to be searched for DSOs. This could allow a local user to execute code as root if an administrator runs apachectl from an untrusted directory (CVE-2012-0883). Possible XSS for sites which use mod_negotiation and allow untrusted uploads to locations which have MultiViews enabled (CVE-2012-2687). The updated packages have been upgraded to the latest 2.2.23 version which is not vulnerable to these issues. Update: Packages for Mandriva Linux 2011 is also being provided. %description This package contains the main binary of apache, a powerful, full-featured, efficient and freely-available Web server. Apache is also the most popular Web server on the Internet. This version of apache is fully modular, and many modules are available in pre-compiled formats, like PHP and mod_auth_external. This package defaults to a maximum of 128 dynamically loadable modules. This package defaults to a ServerLimit of 1024. You can change these values at RPM build time by using for example: --define 'maxmodules 512' --define 'serverlimit 2048' The package was built to support a maximum of 128 dynamically loadable modules. The package was built with a ServerLimit of 1024. %package apache-mod_php lib64php5_common5 php-bcmath php-bz2 php-calendar php-cgi php-cli php-ctype php-curl php-dba php-devel php-doc php-dom php-enchant php-exif php-fileinfo php-filter php-fpm php-ftp php-gd php-gettext php-gmp php-hash php-iconv php-imap php-ini php-intl php-json php-ldap php-mbstring php-mcrypt php-mssql php-mysql php-mysqli php-mysqlnd php-odbc php-openssl php-pcntl php-pdo php-pdo_dblib php-pdo_mysql php-pdo_odbc php-pdo_pgsql php-pdo_sqlite php-pgsql php-phar php-posix php-pspell php-readline php-recode php-session php-shmop php-snmp php-soap php-sockets php-sqlite3 php-sqlite php-sybase_ct php-sysvmsg php-sysvsem php-sysvshm php-tidy php-tokenizer php-wddx php-xml php-xmlreader php-xmlrpc php-xmlwriter php-xsl php-zip php-zlib Update: Mon Oct 01 17:57:05 2012 Importance: bugfix ID: MDVA-2012:060 URL: http://www.mandriva.com/security/advisories?name=MDVA-2012:060 %pre This is a maintenance and bugfix release that upgrades php to the latest 5.3.17 version which resolves numerous upstream bugs in php. %description PHP5 is an HTML-embeddable scripting language. PHP5 offers built-in database integration for several commercial and non-commercial database management systems, so writing a database-enabled script with PHP5 is fairly simple. The most common use of PHP5 coding is probably as a replacement for CGI scripts. This version of php has the suhosin patch 0.9.10 applied. Please report bugs here: http://qa.mandriva.com/ so that the official maintainer of this Mandriva package can help you. More information regarding the suhosin patch 0.9.10 here: http://www.suhosin.org/ %package lib64mysql18 lib64mysqld0 lib64mysql-devel lib64mysqlservices0 lib64mysql-static-devel mysql mysql-bench mysql-client mysql-common mysql-common-core mysql-core Update: Tue Oct 02 09:33:55 2012 Importance: bugfix ID: MDVA-2012:061 URL: http://www.mandriva.com/security/advisories?name=MDVA-2012:061 %pre This is a maintenance and bugfix release that upgrades mysql to the latest version which resolves various upstream bugs. %description The MySQL(TM) software delivers a very fast, multi-threaded, multi-user, and robust SQL (Structured Query Language) database server. MySQL Server is intended for mission-critical, heavy-load production systems as well as for embedding into mass-deployed software. MySQL is a trademark of MySQL AB. The mysql server is compiled with the following storage engines: - InnoDB Storage Engine - Archive Storage Engine - CSV Storage Engine - Federated Storage Engine - User Defined Functions (UDFs). - Blackhole Storage Engine - Partition Storage Engine - Perfschema Storage Engine %package bind bind-devel bind-doc bind-utils Update: Tue Oct 02 11:44:08 2012 Importance: security ID: MDVSA-2012:152-1 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:152-1 %pre A vulnerability was discovered and corrected in bind: A nameserver can be caused to exit with a REQUIRE exception if it can be induced to load a specially crafted resource record (CVE-2012-4244). The updated packages have been upgraded to bind 9.7.6-P3 which is not vulnerable to this issue. Update: Packages for Mandriva Linux 2011 is being provided. The updated packages have been upgraded to bind 9.8.3-P3 which is not vulnerable to this issue. %description BIND (Berkeley Internet Name Domain) is an implementation of the DNS (domain Name System) protocols. BIND includes a DNS server (named), which resolves host names to IP addresses, and a resolver library (routines for applications to use when interfacing with DNS). A DNS server allows clients to name resources or objects and share the information with other network machines. The named DNS server can be used on workstations as a caching name server, but is generally only needed on one machine for an entire network. Note that the configuration files for making BIND act as a simple caching nameserver are included in the caching-nameserver package. Install the bind package if you need a DNS server for your network. If you want bind to act a caching name server, you will also need to install the caching-nameserver package. Many BIND 8 features previously unimplemented in BIND 9, including domain-specific forwarding, the \$GENERATE master file directive, and the "blackhole", "dialup", and "sortlist" options Forwarding of dynamic update requests; this is enabled by the "allow-update-forwarding" option A new, simplified database interface and a number of sample drivers based on it; see doc/dev/sdb for details Support for building single-threaded servers for environments that do not supply POSIX threads New configuration options: "min-refresh-time", "max-refresh-time", "min-retry-time", "max-retry-time", "additional-from-auth", "additional-from-cache", "notify explicit" Faster lookups, particularly in large zones. Build Options: --without sdb_ldap Build without ldap simple database support (enabled per default) --with sdb_mysql Build with MySQL database support (disables ldap support, it's either way.) %package inews inn inn-devel Update: Tue Oct 02 11:53:13 2012 Importance: security ID: MDVSA-2012:156 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:156 %pre A security issue was identified and fixed in ISC INN: The STARTTLS implementation in INN's NNTP server for readers, nnrpd, before 2.5.3 does not properly restrict I/O buffering, which allows man-in-the-middle attackers to insert commands into encrypted sessions by sending a cleartext command that is processed after TLS is in place, related to a plaintext command injection attack, a similar issue to CVE-2011-0411 (CVE-2012-3523). The updated packages have been upgraded to inn 2.5.3 which is not vulnerable to this issue. %description INN (InterNetNews) is a complete system for serving Usenet news and/or private newsfeeds. INN includes innd, an NNTP (NetNews Transport Protocol) server, and nnrpd, a newsreader that is spawned for each client. Both innd and nnrpd vary slightly from the NNTP protocol, but not in ways that are easily noticed. Install the inn package if you need a complete system for serving and reading Usenet news. You may also need to install inn-devel, if you are going to use a separate program which interfaces to INN, like newsgate or tin. %package xinetd xinetd-simple-services Update: Tue Oct 02 12:59:11 2012 Importance: security ID: MDVSA-2012:155-1 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:155-1 %pre A security issue was identified and fixed in xinetd: builtins.c in Xinetd before 2.3.15 does not check the service type when the tcpmux-server service is enabled, which exposes all enabled services and allows remote attackers to bypass intended access restrictions via a request to tcpmux port 1 (CVE-2012-0862). The updated packages have been patched to correct this issue. %description xinetd is a powerful replacement for inetd. xinetd has access control machanisms, extensive logging capabilities, the ability to make services available based on time, and can place limits on the number of servers that can be started, among other things. xinetd has the ability to redirect TCP streams to a remote host and port. This is useful for those of that use ip masquerading, or NAT, and want to be able to reach your internal hosts. xinetd also has the ability to bind specific services to specific interfaces. This is useful when you want to make services available for your internal network, but not the rest of the world. Or to have a different service running on the same port, but different interfaces. %package dhcp-client dhcp-common dhcp-devel dhcp-doc dhcp-relay dhcp-server Update: Tue Oct 02 14:38:50 2012 Importance: security ID: MDVSA-2012:153-1 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:153-1 %pre A security issue was identified and fixed in dhcp: ISC DHCP 4.1.x before 4.1-ESV-R7 and 4.2.x before 4.2.4-P2 allows remote attackers to cause a denial of service (daemon crash) in opportunistic circumstances by establishing an IPv6 lease in an environment where the lease expiration time is later reduced (CVE-2012-3955). The updated packages have been patched to correct this issue. Update: Packages for Mandriva Linux 2011 is being provided. The updated packages have been upgraded to dhcp 4.2.4-P2 which is not vulnerable to this issue. %description DHCP (Dynamic Host Configuration Protocol) is a protocol which allows individual devices on an IP network to get their own network configuration information (IP address, subnetmask, broadcast address, etc.) from a DHCP server. The overall purpose of DHCP is to make it easier to administer a large network. The dhcp package includes the DHCP server and a DHCP relay agent. You will also need to install the dhcp-client or dhcpcd package, or pump or dhcpxd, which provides the DHCP client daemon, on client machines. If you want the DHCP server and/or relay, you will also need to install the dhcp-server and/or dhcp-relay packages. %package lib64openjpeg2 lib64openjpeg-devel Update: Wed Oct 03 08:33:19 2012 Importance: security ID: MDVSA-2012:157 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:157 %pre A security issue was identified and fixed in openjpeg: A heap-based buffer overflow was found in the way OpenJPEG, an open-source JPEG 2000 codec written in C language, performed parsing of JPEG2000 image files. A remote attacker could provide a specially crafted JPEG 2000 file, which when opened in an application linked against openjpeg would lead to that application crash, or, potentially arbitrary code execution with the privileges of the user running the application (CVE-2012-3535). The updated packages have been patched to correct this issue. %description The OpenJPEG library is an open-source JPEG 2000 codec written in C language. It has been developed in order to promote the use of JPEG 2000, the new still-image compression standard from the Joint Photographic Experts Group (JPEG). %package lib64gc1 lib64gc-devel lib64gc-static-devel Update: Wed Oct 03 11:49:38 2012 Importance: security ID: MDVSA-2012:158 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:158 %pre A security issue was identified and fixed in gc: Multiple integer overflows in the (1) GC_generic_malloc and (2) calloc funtions in malloc.c, and the (3) GC_generic_malloc_ignore_off_page function in mallocx.c in Boehm-Demers-Weiser GC (libgc) before 7.2 make it easier for context-dependent attackers to perform memory-related attacks such as buffer overflows via a large size value, which causes less memory to be allocated than expected (CVE-2012-2673). The updated packages have been patched to correct this issue. %description Boehm's GC is a garbage collecting storage allocator that is intended to be used as a plug-in replacement for C's malloc. %package freeradius freeradius-krb5 freeradius-ldap freeradius-mysql freeradius-postgresql freeradius-sqlite freeradius-unixODBC freeradius-web lib64freeradius1 lib64freeradius-devel Update: Wed Oct 03 14:13:26 2012 Importance: security ID: MDVSA-2012:159 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:159 %pre A vulnerability has been found and corrected in freeradius: Stack-based buffer overflow in the cbtls_verify function in FreeRADIUS 2.1.10 through 2.1.12, when using TLS-based EAP methods, allows remote attackers to cause a denial of service (server crash) and possibly execute arbitrary code via a long not after timestamp in a client certificate (CVE-2012-3547). The updated packages have been patched to correct this issue. %description The FreeRADIUS Server Project is a high-performance and highly configurable GPL'd RADIUS server. It is somewhat similar to the Livingston 2.0 RADIUS server, but has many more features, and is much more configurable. %package ghostscript ghostscript-common ghostscript-doc ghostscript-dvipdf ghostscript-module-X ghostscript-X lib64gs9 lib64gs-devel lib64ijs1 lib64ijs-devel Update: Fri Oct 05 13:08:08 2012 Importance: security ID: MDVSA-2012:151-1 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:151-1 %pre A security issue was identified and fixed in ghostscript: An integer overflow flaw, leading to a heap-based buffer overflow, was found in Ghostscript's International Color Consortium Format library (icclib). An attacker could create a specially-crafted PostScript or PDF file with embedded images that would cause Ghostscript to crash or, potentially, execute arbitrary code with the privileges of the user running Ghostscript (CVE-2012-4405). The updated packages have been patched to correct this issue. Update: Packages for Mandriva Linux 2011 is being provided. %description Ghostscript is a set of software tools that provide a PostScript(TM) interpreter, a set of C procedures (the Ghostscript library, which implements the graphics capabilities in the PostScript language) and an interpreter for Portable Document Format (PDF) files. Ghostscript translates PostScript code into many common, bitmapped and vector formats, like those understood by your printer or screen. Ghostscript is normally used to display PostScript files and to print PostScript files to non-PostScript printers. You should install ghostscript if you need to display PostScript or PDF files, or if you have a non-PostScript printer. %package java-1.6.0-openjdk java-1.6.0-openjdk-demo java-1.6.0-openjdk-devel java-1.6.0-openjdk-javadoc java-1.6.0-openjdk-src Update: Fri Oct 05 14:08:18 2012 Importance: security ID: MDVSA-2012:150-1 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:150-1 %pre Multiple security issues were identified and fixed in OpenJDK (icedtea6): Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 6 and earlier, and 6 Update 34 and earlier, has no impact and remote attack vectors involving AWT and a security-in-depth issue that is not directly exploitable but which can be used to aggravate security vulnerabilities that can be directly exploited. NOTE: this identifier was assigned by the Oracle CNA, but CVE is not intended to cover defense-in-depth issues that are only exposed by the presence of other vulnerabilities (CVE-2012-0547). Unspecified vulnerability in the Java Runtime Environment (JRE) component in Oracle Java SE 7 Update 6 and earlier allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors related to Beans, a different vulnerability than CVE-2012-3136 (CVE-2012-1682). The updated packages provides icedtea6-1.11.4 which is not vulnerable to these issues. Update: Packages for Mandriva Linux 2011 is being provided. %description The OpenJDK runtime environment. %package imagemagick imagemagick-desktop imagemagick-doc lib64magick4 lib64magick-devel perl-Image-Magick Update: Fri Oct 05 15:03:17 2012 Importance: security ID: MDVSA-2012:160 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:160 %pre A vulnerability has been found and corrected in imagemagick: The Magick_png_malloc function in coders/png.c in ImageMagick 6.7.8-6 does not use the proper variable type for the allocation size, which might allow remote attackers to cause a denial of service (crash) via a crafted PNG file that triggers incorrect memory allocation (CVE-2012-3437). The updated packages have been patched to correct this issue. %description ImageMagick is a powerful image display, conversion and manipulation tool. It runs in an X session. With this tool, you can view, edit and display a variety of image formats. ImageMagick can make use of the following delegate programs, available as packages in Mandriva Linux: curl enscript ffmpeg ghostscript ghostscript-X gimp gnuplot graphviz html2ps mplayer ncompress netpbm sane-backends tetex-dvips transfig ufraw xdg-utils zip autotrace povray %package html2ps xhtml2ps Update: Sat Oct 06 09:26:14 2012 Importance: security ID: MDVSA-2012:161 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:161 %pre A vulnerability has been found and corrected in html2ps: Directory traversal vulnerability in html2ps before 1.0b7 allows remote attackers to read arbitrary files via directory traversal sequences in SSI directives (CVE-2009-5067). The updated packages have been upgraded to the 1.0b7 version which is not affected by this issue. %description The Perl script html2ps converts HTML to PostScript. It would have more capabilities if you have some of these packages installed: ImageMagick, netpbm-progs, libjpeg-progs, perl-libwww, ghostscript, tetex, tetex-dvips - see documentation for details. html2ps can be used as ImageMagick delegate to convert from HTML. %package bind bind-devel bind-doc bind-utils Update: Wed Oct 10 11:41:50 2012 Importance: security ID: MDVSA-2012:162 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:162 %pre A vulnerability was discovered and corrected in bind: A certain combination of records in the RBT could cause named to hang while populating the additional section of a response. [RT #31090] (CVE-2012-5166). The updated packages have been upgraded to bind 9.7.6-P4 and 9.8.3-P4 which is not vulnerable to this issue. %description BIND (Berkeley Internet Name Domain) is an implementation of the DNS (domain Name System) protocols. BIND includes a DNS server (named), which resolves host names to IP addresses, and a resolver library (routines for applications to use when interfacing with DNS). A DNS server allows clients to name resources or objects and share the information with other network machines. The named DNS server can be used on workstations as a caching name server, but is generally only needed on one machine for an entire network. Note that the configuration files for making BIND act as a simple caching nameserver are included in the caching-nameserver package. Install the bind package if you need a DNS server for your network. If you want bind to act a caching name server, you will also need to install the caching-nameserver package. Many BIND 8 features previously unimplemented in BIND 9, including domain-specific forwarding, the \$GENERATE master file directive, and the "blackhole", "dialup", and "sortlist" options Forwarding of dynamic update requests; this is enabled by the "allow-update-forwarding" option A new, simplified database interface and a number of sample drivers based on it; see doc/dev/sdb for details Support for building single-threaded servers for environments that do not supply POSIX threads New configuration options: "min-refresh-time", "max-refresh-time", "min-retry-time", "max-retry-time", "additional-from-auth", "additional-from-cache", "notify explicit" Faster lookups, particularly in large zones. Build Options: --without sdb_ldap Build without ldap simple database support (enabled per default) --with sdb_mysql Build with MySQL database support (disables ldap support, it's either way.) %package lib64xslt1 lib64xslt-devel python-libxslt xsltproc Update: Thu Oct 11 13:20:11 2012 Importance: security ID: MDVSA-2012:164 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:164 %pre Multiple vulnerabilities has been discovered and corrected in libxslt: Unspecified vulnerability in XSLT allows remote attackers to obtain potentially sensitive information about heap memory addresses via unknown vectors (CVE-2011-1202). libxslt 1.1.26 and earlier does not properly manage memory, which might allow remote attackers to cause a denial of service (application crash) via a crafted XSLT expression that is not properly identified during XPath navigation, related to (1) the xsltCompileLocationPathPattern function in libxslt/pattern.c and (2) the xsltGenerateIdFunction function in libxslt/functions.c (CVE-2012-2870). libxml2 2.9.0-rc1 and earlier does not properly support a cast of an unspecified variable during handling of XSL transforms, which allows remote attackers to cause a denial of service or possibly have unknown other impact via a crafted document, related to the _xmlNs data structure in include/libxml/tree.h (CVE-2012-2871). Double free vulnerability in libxslt allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors related to XSL transforms (CVE-2012-2893). The updated packages have been patched to correct these issues. %description This C library allows to transform XML files into other XML files (or HTML, text, ...) using the standard XSLT stylesheet transformation mechanism. %package graphicsmagick graphicsmagick-doc lib64graphicsmagick3 lib64graphicsmagick-devel lib64graphicsmagickwand2 perl-Graphics-Magick Update: Fri Oct 12 12:56:00 2012 Importance: security ID: MDVSA-2012:165 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:165 %pre A vulnerability has been found and corrected in graphicsmagick: The Magick_png_malloc function in coders/png.c in GraphicsMagick 6.7.8-6 does not use the proper variable type for the allocation size, which might allow remote attackers to cause a denial of service (crash) via a crafted PNG file that triggers incorrect memory allocation (CVE-2012-3438). The updated packages have been patched to correct this issue. %description GraphicsMagick is the swiss army knife of image processing. It provides a robust collection of tools and libraries which support reading, writing, and manipulating an image in over 88 major formats including important formats like DPX, GIF, JPEG, JPEG-2000, PNG, PDF, SVG, and TIFF. GraphicsMagick supports huge images on systems that support large files, and has been tested with gigapixel-size images. GraphicsMagick can create new images on the fly, making it suitable for building dynamic Web applications. GraphicsMagick may be used to resize, rotate, sharpen, color reduce, or add special effects to an image and save the result in the same or differing image format. Image processing operations are available from the command line, as well as through C, C++, Perl, or Windows COM programming interfaces. Extensions are available from third-parties to support programming in Python, Tcl, and Ruby. With some modification, language extensions for ImageMagick may be used. %package hostapd Update: Mon Oct 22 08:02:57 2012 Importance: security ID: MDVSA-2012:168 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:168 %pre Multiple vulnerabilities has been discovered and corrected in hostapd: hostapd 0.7.3, and possibly other versions before 1.0, uses 0644 permissions for /etc/hostapd/hostapd.conf, which might allow local users to obtain sensitive information such as credentials (CVE-2012-2389). Heap-based buffer overflow in the eap_server_tls_process_fragment function in eap_server_tls_common.c in the EAP authentication server in hostapd 0.6 through 1.0 allows remote attackers to cause a denial of service (crash or abort) via a small TLS Message Length value in an EAP-TLS message with the More Fragments flag set (CVE-2012-4445). The updated packages have been patched to correct these issues. %description Hostapd is an optional user space component for Host AP driver. It adds more features to the basic IEEE 802.11 management included in the kernel driver: using external RADIUS authentication server for MAC address based access control, IEEE 802.1X Authenticator and dynamic WEP keying, RADIUS accounting. %package apache-mod_php lib64php5_common5 php-apc php-apc-admin php-bcmath php-bz2 php-calendar php-cgi php-cli php-ctype php-curl php-dba php-devel php-doc php-dom php-enchant php-exif php-fileinfo php-filter php-fpm php-ftp php-gd php-gettext php-gmp php-hash php-iconv php-imap php-ini php-intl php-json php-ldap php-mbstring php-mcrypt php-mssql php-mysql php-mysqli php-mysqlnd php-odbc php-openssl php-pcntl php-pdo php-pdo_dblib php-pdo_mysql php-pdo_odbc php-pdo_pgsql php-pdo_sqlite php-pgsql php-phar php-posix php-pspell php-readline php-recode php-session php-shmop php-snmp php-soap php-sockets php-sqlite3 php-sqlite php-sybase_ct php-sysvmsg php-sysvsem php-sysvshm php-tidy php-timezonedb php-tokenizer php-wddx php-xml php-xmlreader php-xmlrpc php-xmlwriter php-xsl php-zip php-zlib Update: Mon Oct 22 14:42:53 2012 Importance: bugfix ID: MDVA-2012:065 URL: http://www.mandriva.com/security/advisories?name=MDVA-2012:065 %pre This is a maintenance and bugfix release that upgrades php to the latest 5.3.18 version which resolves numerous upstream bugs in php. Additionally the php-timezonedb and php-apc packages has been upgraded to the latest versions as well. %description PHP5 is an HTML-embeddable scripting language. PHP5 offers built-in database integration for several commercial and non-commercial database management systems, so writing a database-enabled script with PHP5 is fairly simple. The most common use of PHP5 coding is probably as a replacement for CGI scripts. This version of php has the suhosin patch 0.9.10 applied. Please report bugs here: http://qa.mandriva.com/ so that the official maintainer of this Mandriva package can help you. More information regarding the suhosin patch 0.9.10 here: http://www.suhosin.org/ %package lib64ecpg9.0_6 lib64pq9.0_5 postgresql9.0 postgresql9.0-contrib postgresql9.0-devel postgresql9.0-docs postgresql9.0-pl postgresql9.0-plperl postgresql9.0-plpgsql postgresql9.0-plpython postgresql9.0-pltcl postgresql9.0-server Update: Mon Oct 29 10:31:55 2012 Importance: bugfix ID: MDVA-2012:066 URL: http://www.mandriva.com/security/advisories?name=MDVA-2012:066 %pre This is a maintenance and bugfix release that upgrades postgresql to the latest 8.3.21 and 9.0.10 versions which resolves numerous upstream bugs in postgresql. %description PostgreSQL is an advanced Object-Relational database management system (DBMS) that supports almost all SQL constructs (including transactions, subselects and user-defined types and functions). The postgresql package includes the client programs and libraries that you'll need to access a PostgreSQL DBMS server. These PostgreSQL client programs are programs that directly manipulate the internal structure of PostgreSQL databases on a PostgreSQL server. These client programs can be located on the same machine with the PostgreSQL server, or may be on a remote machine which accesses a PostgreSQL server over a network connection. This package contains the client libraries for C and C++, as well as command-line utilities for managing PostgreSQL databases on a PostgreSQL server. If you want to manipulate a PostgreSQL database on a remote PostgreSQL server, you need this package. You also need to install this package if you're installing the postgresql-server package. %package java-1.6.0-openjdk java-1.6.0-openjdk-demo java-1.6.0-openjdk-devel java-1.6.0-openjdk-javadoc java-1.6.0-openjdk-src Update: Thu Nov 01 12:18:32 2012 Importance: security ID: MDVSA-2012:169 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:169 %pre Multiple security issues were identified and fixed in OpenJDK (icedtea6): * S6631398, CVE-2012-3216: FilePermission improved path checking * S7093490: adjust package access in rmiregistry * S7143535, CVE-2012-5068: ScriptEngine corrected permissions * S7167656, CVE-2012-5077: Multiple Seeders are being created * S7169884, CVE-2012-5073: LogManager checks do not work correctly for sub-types * S7169888, CVE-2012-5075: Narrowing resource definitions in JMX RMI connector * S7172522, CVE-2012-5072: Improve DomainCombiner checking * S7186286, CVE-2012-5081: TLS implementation to better adhere to RFC * S7189103, CVE-2012-5069: Executors needs to maintain state * S7189490: More improvements to DomainCombiner checking * S7189567, CVE-2012-5085: java net obselete protocol * S7192975, CVE-2012-5071: Conditional usage check is wrong * S7195194, CVE-2012-5084: Better data validation for Swing * S7195917, CVE-2012-5086: XMLDecoder parsing at close-time should be improved * S7195919, CVE-2012-5979: (sl) ServiceLoader can throw CCE without needing to create instance * S7198296, CVE-2012-5089: Refactor classloader usage * S7158800: Improve storage of symbol tables * S7158801: Improve VM CompileOnly option * S7158804: Improve config file parsing * S7176337: Additional changes needed for 7158801 fix * S7198606, CVE-2012-4416: Improve VM optimization The updated packages provides icedtea6-1.11.5 which is not vulnerable to these issues. %description The OpenJDK runtime environment. %package lib64nspr4 lib64nspr-devel lib64nss3 lib64nss-devel lib64nss-static-devel nss rootcerts rootcerts-java Update: Fri Nov 02 17:08:11 2012 Importance: bugfix ID: MDVA-2012:067 URL: http://www.mandriva.com/security/advisories?name=MDVA-2012:067 %pre This advisory brings the latest root CA certs from the mozilla cvs dated 2012-10-18. The mozilla NSPR and NSS libraries has been upgraded to the latest versions. %description This is a bundle of X.509 certificates of public Certificate Authorities (CA). These were automatically extracted from Mozilla's root CA list (the file "certdata.txt"). It contains the certificates in both plain text and PEM format and therefore can be directly used with an Apache/mod_ssl webserver for SSL client authentication. Just configure this file as the SSLCACertificateFile. %package lib64modman1 lib64proxy1 lib64proxy-devel libproxy-gnome libproxy-kde libproxy-networkmanager libproxy-perl libproxy-utils python-libproxy Update: Mon Nov 19 09:59:09 2012 Importance: security ID: MDVSA-2012:172 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:172 %pre A vulnerability has been discovered and corrected in libproxy: Stack-based buffer overflow in the url::get_pac function in url.cpp in libproxy 0.4.x before 0.4.9 allows remote servers to have an unspecified impact via a large proxy.pac file (CVE-2012-4504). The updated packages have been patched to correct this issue. %description libproxy offers the following features: * extremely small core footprint (< 35K) * no external dependencies within libproxy core (libproxy plugins may have dependencies) * only 3 functions in the stable external API * dynamic adjustment to changing network topology * a standard way of dealing with proxy settings across all scenarios * a sublime sense of joy and accomplishment %package lib64tiff3 lib64tiff-devel lib64tiff-static-devel libtiff-progs Update: Thu Nov 22 12:21:26 2012 Importance: security ID: MDVSA-2012:174 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:174 %pre Multiple vulnerabilities was found and corrected in libtiff: Heap-based buffer overflow in tif_pixarlog.c in LibTIFF before 4.0.3 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a crafted TIFF image using the PixarLog Compression format (CVE-2012-4447). ppm2tiff does not check the return value of the TIFFScanlineSize function, which allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted PPM image that triggers an integer overflow, a zero-memory allocation, and a heap-based buffer overflow (CVE-2012-4564). The updated packages have been patched to correct these issues. %description The libtiff package contains a library of functions for manipulating TIFF (Tagged Image File Format) image format files. TIFF is a widely used file format for bitmapped images. TIFF files usually end in the .tif extension and they are often quite large. %package apache-mod_php lib64php5_common5 php-bcmath php-bz2 php-calendar php-cgi php-cli php-ctype php-curl php-dba php-devel php-doc php-dom php-enchant php-exif php-fileinfo php-filter php-fpm php-ftp php-gd php-gettext php-gmp php-hash php-iconv php-imap php-ini php-intl php-json php-ldap php-mbstring php-mcrypt php-mssql php-mysql php-mysqli php-mysqlnd php-odbc php-openssl php-pcntl php-pdo php-pdo_dblib php-pdo_mysql php-pdo_odbc php-pdo_pgsql php-pdo_sqlite php-pgsql php-phar php-posix php-pspell php-readline php-recode php-session php-shmop php-snmp php-soap php-sockets php-sqlite3 php-sqlite php-sybase_ct php-sysvmsg php-sysvsem php-sysvshm php-tidy php-timezonedb php-tokenizer php-wddx php-xml php-xmlreader php-xmlrpc php-xmlwriter php-xsl php-zip php-zlib Update: Mon Nov 26 12:32:12 2012 Importance: bugfix ID: MDVA-2012:068 URL: http://www.mandriva.com/security/advisories?name=MDVA-2012:068 %pre This is a maintenance and bugfix release that upgrades php to the latest 5.3.19 version which resolves numerous upstream bugs in php. Additionally the php-timezonedb packages has been upgraded to the latest version as well. %description PHP5 is an HTML-embeddable scripting language. PHP5 offers built-in database integration for several commercial and non-commercial database management systems, so writing a database-enabled script with PHP5 is fairly simple. The most common use of PHP5 coding is probably as a replacement for CGI scripts. This version of php has the suhosin patch 0.9.10 applied. Please report bugs here: http://qa.mandriva.com/ so that the official maintainer of this Mandriva package can help you. More information regarding the suhosin patch 0.9.10 here: http://www.suhosin.org/ %package lib64ssh4 lib64ssh-devel Update: Thu Nov 29 11:05:38 2012 Importance: security ID: MDVSA-2012:175 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:175 %pre Multiple double free(), buffer overflow, invalid free() and improper overflow checks vulnerabilities was found and corrected in libssh (CVE-2012-4559, CVE-2012-4560, CVE-2012-4561, CVE-2012-4562). The updated packages have been upgraded to the 0.5.3 version which is not affected by these issues. %description The ssh library was designed to be used by programmers needing a working SSH implementation by the mean of a library. The complete control of the client is made by the programmer. With libssh, you can remotely execute programs, transfer files, use a secure and transparent tunnel for your remote programs. With its Secure FTP implementation, you can play with remote files easily, without third-party programs others than libcrypto (from openssl). libssh features : * Full C library functions for manipulating a client-side SSH connection * Lesser GPL licensing -SSH2 protocol compliant * Fully configurable sessions * Support for AES-128,AES-192,AES-256,blowfish, in cbc mode * Use multiple SSH connections in a same process, at same time * Use multiple channels in the same connection * Thread safety when using different sessions at same time * Basic but correct SFTP implementation (secure file transfer) * RSA and DSS server public key supported * Compression support (with zlib) * Public key (RSA and DSS), password and keyboard-interactive authentication * Complete documentation about its API * Runs and tested under amd64, x86, arm, sparc32, ppc under Linux, BSD, MacosX and Solaris * A developer listening to you * It's free (LGPL)! %package lib64xml2_2 lib64xml2-devel libxml2-python libxml2-utils Update: Sun Dec 02 19:39:59 2012 Importance: security ID: MDVSA-2012:176 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:176 %pre A vulnerability was found and corrected in libxml2: A heap-buffer overflow was found in the way libxml2 decoded certain XML entitites. A remote attacker could provide a specially-crafted XML file, which once opened in an application linked against libxml would cause that application to crash, or, potentially, execute arbitrary code with the privileges of the user running the application (CVE-2012-5134). The updated packages have been patched to correct this issue. %description This library allows you to manipulate XML files. It includes support for reading, modifying and writing XML and HTML files. There is DTDs support: this includes parsing and validation even with complex DtDs, either at parse time or later once the document has been modified. The output can be a simple SAX stream or and in-memory DOM-like representations. In this case one can use the built-in XPath and XPointer implementation to select subnodes or ranges. A flexible Input/Output mechanism is available, with existing HTTP and FTP modules and combined to a URI library. %package bind bind-devel bind-doc bind-utils Update: Wed Dec 05 17:46:09 2012 Importance: security ID: MDVSA-2012:177 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:177 %pre A vulnerability was discovered and corrected in bind: BIND 9 nameservers using the DNS64 IPv6 transition mechanism are vulnerable to a software defect that allows a crafted query to crash the server with a REQUIRE assertion failure. Remote exploitation of this defect can be achieved without extensive effort, resulting in a denial-of-service (DoS) vector against affected servers (CVE-2012-5688). The updated packages have been upgraded to bind 9.8.4-P1 which is not vulnerable to this issue. %description BIND (Berkeley Internet Name Domain) is an implementation of the DNS (domain Name System) protocols. BIND includes a DNS server (named), which resolves host names to IP addresses, and a resolver library (routines for applications to use when interfacing with DNS). A DNS server allows clients to name resources or objects and share the information with other network machines. The named DNS server can be used on workstations as a caching name server, but is generally only needed on one machine for an entire network. Note that the configuration files for making BIND act as a simple caching nameserver are included in the caching-nameserver package. Install the bind package if you need a DNS server for your network. If you want bind to act a caching name server, you will also need to install the caching-nameserver package. Many BIND 8 features previously unimplemented in BIND 9, including domain-specific forwarding, the \$GENERATE master file directive, and the "blackhole", "dialup", and "sortlist" options Forwarding of dynamic update requests; this is enabled by the "allow-update-forwarding" option A new, simplified database interface and a number of sample drivers based on it; see doc/dev/sdb for details Support for building single-threaded servers for environments that do not supply POSIX threads New configuration options: "min-refresh-time", "max-refresh-time", "min-retry-time", "max-retry-time", "additional-from-auth", "additional-from-cache", "notify explicit" Faster lookups, particularly in large zones. Build Options: --without sdb_ldap Build without ldap simple database support (enabled per default) --with sdb_mysql Build with MySQL database support (disables ldap support, it's either way.) %package lib64mysql18 lib64mysqld0 lib64mysql-devel lib64mysqlservices0 lib64mysql-static-devel mysql mysql-bench mysql-client mysql-common mysql-common-core mysql-core Update: Sun Dec 09 11:15:19 2012 Importance: security ID: MDVSA-2012:178 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:178 %pre A vulnerability was discovered and corrected in mysql: Stack-based buffer overflow in MySQL 5.5.19, 5.1.53, and possibly other versions, and MariaDB 5.5.2.x before 5.5.28a, 5.3.x before 5.3.11, 5.2.x before 5.2.13 and 5.1.x before 5.1.66, allows remote authenticated users to execute arbitrary code via a long argument to the GRANT FILE command (CVE-2012-5611). The updated packages have been patched to correct this issue. %description The MySQL(TM) software delivers a very fast, multi-threaded, multi-user, and robust SQL (Structured Query Language) database server. MySQL Server is intended for mission-critical, heavy-load production systems as well as for embedding into mass-deployed software. MySQL is a trademark of MySQL AB. The mysql server is compiled with the following storage engines: - InnoDB Storage Engine - Archive Storage Engine - CSV Storage Engine - Federated Storage Engine - User Defined Functions (UDFs). - Blackhole Storage Engine - Partition Storage Engine - Perfschema Storage Engine %package cups cups-common cups-serial lib64cups2 lib64cups2-devel php-cups Update: Wed Dec 12 15:00:16 2012 Importance: security ID: MDVSA-2012:179 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:179 %pre A vulnerability was discovered and corrected in cups: CUPS 1.4.4, when running in certain Linux distributions such as Debian GNU/Linux, stores the web interface administrator key in /var/run/cups/certs/0 using certain permissions, which allows local users in the lpadmin group to read or write arbitrary files as root by leveraging the web interface (CVE-2012-5519). The updated packages have been patched to correct this issue. %description The Common Unix Printing System provides a portable printing layer for UNIX(TM) operating systems. It has been developed by Easy Software Products to promote a standard printing solution for all UNIX vendors and users. CUPS provides the System V and Berkeley command-line interfaces. This is the main package needed for CUPS servers (machines where a printer is connected to or which host a queue for a network printer). It can also be used on CUPS clients so that they simply pick up broadcasted printer information from other CUPS servers and do not need to be assigned to a specific CUPS server by an /etc/cups/client.conf file. %package perl-CGI perl-CGI-Fast Update: Mon Dec 17 13:01:17 2012 Importance: security ID: MDVSA-2012:180 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:180 %pre A vulnerability was discovered and corrected in perl-CGI: CGI.pm module before 3.63 for Perl does not properly escape newlines in (1) Set-Cookie or (2) P3P headers, which might allow remote attackers to inject arbitrary headers into responses from applications that use CGI.pm (CVE-2012-5526). The updated packages have been patched to correct this issue. %description This perl library uses perl5 objects to make it easy to create Web fill-out forms and parse their contents. This package defines CGI objects, entities that contain the values of the current query string and other state variables. Using a CGI object's methods, you can examine keywords and parameters passed to your script, and create forms whose initial values are taken from the current query (thereby preserving state information). %package python-django Update: Wed Dec 19 15:19:40 2012 Importance: security ID: MDVSA-2012:181 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:181 %pre Multiple host header poisoning flaws were found and fixed in Django. The updated packages have been upgraded to the 1.3.5 version which is not affected by these issues. %description Django is a high-level Python Web framework that encourages rapid development and clean, pragmatic design. Developed and used over the past two years by a fast-moving online-news operation, Django was designed from scratch to handle two challenges: the intensive deadlines of a newsroom and the stringent requirements of experienced Web developers. It has convenient niceties for developing content-management systems, but it's an excellent tool for building any Web site. Django focuses on automating as much as possible and adhering to the DRY principle. %package apache-mod_php lib64php5_common5 php-apc php-apc-admin php-bcmath php-bz2 php-calendar php-cgi php-cli php-ctype php-curl php-dba php-devel php-doc php-dom php-eaccelerator php-eaccelerator-admin php-enchant php-exif php-fileinfo php-filter php-fpm php-ftp php-gd php-gettext php-gmp php-hash php-iconv php-imap php-ini php-intl php-json php-ldap php-mailparse php-mbstring php-mcal php-mcrypt php-mssql php-mysql php-mysqli php-mysqlnd php-odbc php-openssl php-optimizer php-pcntl php-pdo php-pdo_dblib php-pdo_mysql php-pdo_odbc php-pdo_pgsql php-pdo_sqlite php-pgsql php-phar php-posix php-pspell php-readline php-recode php-sasl php-session php-shmop php-snmp php-soap php-sockets php-sqlite3 php-sqlite php-ssh2 php-suhosin php-sybase_ct php-sysvmsg php-sysvsem php-sysvshm php-tclink php-tidy php-timezonedb php-tokenizer php-translit php-vld php-wddx php-xattr php-xdebug php-xml php-xmlreader php-xmlrpc php-xmlwriter php-xsl php-zip php-zlib Update: Sat Dec 22 15:05:34 2012 Importance: bugfix ID: MDVA-2012:070 URL: http://www.mandriva.com/security/advisories?name=MDVA-2012:070 %pre This is a maintenance and bugfix release that upgrades php to the latest 5.3.20 version which resolves various upstream bugs in php. For Mandriva Linux 2011 the php-ssh2, php-vld, php-xattr and php-xdebug packages has been upgraded to the latest versions. For Mandriva Linux Enterprise Server 5 the php-dio, php-memcache, php-vld, php-xattr, php-xdebug and php-yaz packages has been upgraded to the latest versions. %description PHP5 is an HTML-embeddable scripting language. PHP5 offers built-in database integration for several commercial and non-commercial database management systems, so writing a database-enabled script with PHP5 is fairly simple. The most common use of PHP5 coding is probably as a replacement for CGI scripts. This version of php has the suhosin patch 0.9.10 applied. Please report bugs here: http://qa.mandriva.com/ so that the official maintainer of this Mandriva package can help you. More information regarding the suhosin patch 0.9.10 here: http://www.suhosin.org/ %package apache-mod_security mlogc Update: Sun Dec 23 19:23:00 2012 Importance: security ID: MDVSA-2012:182 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:182 %pre Multiple vulnerabilities has been discovered and corrected in apache-mod_security: ModSecurity before 2.6.6, when used with PHP, does not properly handle single quotes not at the beginning of a request parameter value in the Content-Disposition field of a request with a multipart/form-data Content-Type header, which allows remote attackers to bypass filtering rules and perform other attacks such as cross-site scripting (XSS) attacks. NOTE: this vulnerability exists because of an incomplete fix for CVE-2009-5031 (CVE-2012-2751). ModSecurity <= 2.6.8 is vulnerable to multipart/invalid part ruleset bypass, this was fixed in 2.7.0 (released on2012-10-16) (CVE-2012-4528). The updated packages have been patched to correct these issues. %description ModSecurity is an open source intrustion detection and prevention engine for web applications. It operates embedded into the web server, acting as a powerful umbrella - shielding applications from attacks. %package lib64tiff3 lib64tiff-devel lib64tiff-static-devel libtiff-progs Update: Thu Dec 27 10:38:22 2012 Importance: security ID: MDVSA-2012:184 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2012:184 %pre A vulnerability was found and corrected in libtiff: A stack-based buffer overflow was found in the way libtiff handled DOTRANGE tags. An attacker could use this flaw to create a specially-crafted TIFF file that, when opened, would cause an application linked against libtiff to crash or, possibly, execute arbitrary code (CVE-2012-5581). The updated packages have been patched to correct this issue. %description The libtiff package contains a library of functions for manipulating TIFF (Tagged Image File Format) image format files. TIFF is a widely used file format for bitmapped images. TIFF files usually end in the .tif extension and they are often quite large. %package gnupg gnupg2 Update: Wed Jan 02 13:20:14 2013 Importance: security ID: MDVSA-2013:001 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2013:001 %pre A vulnerability has been found and corrected in gnupg: Versions of GnuPG <= 1.4.12 are vulnerable to memory access violations and public keyring database corruption when importing public keys that have been manipulated. An OpenPGP key can be fuzzed in such a way that gpg segfaults (or has other memory access violations) when importing the key (CVE-2012-6085). The updated packages have been patched to correct this issue. %description GnuPG is GNU's tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440. %package lib64nss3 lib64nss-devel lib64nss-static-devel nss rootcerts rootcerts-java Update: Wed Jan 09 15:52:38 2013 Importance: security ID: MDVSA-2013:003 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2013:003 %pre Google reported to Mozilla that TURKTRUST, a certificate authority in Mozillas root program, had mis-issued two intermediate certificates to customers. The issue was not specific to Firefox but there was evidence that one of the certificates was used for man-in-the-middle (MITM) traffic management of domain names that the customer did not legitimately own or control. This issue was resolved by revoking the trust for these specific mis-issued certificates (CVE-2013-0743). The rootcerts package has been upgraded to address this flaw and the Mozilla NSS package has been rebuilt to pickup the changes. %description This is a bundle of X.509 certificates of public Certificate Authorities (CA). These were automatically extracted from Mozilla's root CA list (the file "certdata.txt"). It contains the certificates in both plain text and PEM format and therefore can be directly used with an Apache/mod_ssl webserver for SSL client authentication. Just configure this file as the SSLCACertificateFile. %package perl perl-base perl-devel perl-doc Update: Mon Jan 28 13:32:02 2013 Importance: security ID: MDVSA-2013:005 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2013:005 %pre A vulnerability has been found and corrected in perl: Heap-based buffer overflow in the Perl_repeatcpy function in util.c in Perl 5.12.x before 5.12.5, 5.14.x before 5.14.3, and 5.15.x before 15.15.5 allows context-dependent attackers to cause a denial of service (memory consumption and crash) or possibly execute arbitrary code via the 'x' string repeat operator (CVE-2012-5195). The updated packages have been patched to correct this issue. %description Perl is a high-level programming language with roots in C, sed, awk and shell scripting. Perl is good at handling processes and files, and is especially good at handling text. Perl's hallmarks are practicality and efficiency. While it is used to do a lot of different things, Perl's most common applications (and what it excels at) are probably system administration utilities and web programming. A large proportion of the CGI scripts on the web are written in Perl. You need the perl package installed on your system so that your system can handle Perl scripts. You need perl-base to have a full perl. %package freetype2-demos lib64freetype6 lib64freetype6-devel lib64freetype6-static-devel Update: Fri Feb 01 09:36:20 2013 Importance: security ID: MDVSA-2013:006 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2013:006 %pre Multiple vulnerabilities has been found and corrected in freetype2: A Null pointer de-reference flaw was found in the way Freetype font rendering engine handled Glyph bitmap distribution format (BDF) fonts. A remote attacker could provide a specially-crafted BDF font file, which once processed in an application linked against FreeType would lead to that application crash (CVE-2012-5668). An out-of heap-based buffer read flaw was found in the way FreeType font rendering engine performed parsing of glyph information and relevant bitmaps for glyph bitmap distribution format (BDF). A remote attacker could provide a specially-crafted BDF font file, which once opened in an application linked against FreeType would lead to that application crash (CVE-2012-5669). The updated packages have been patched to correct these issues. %description The FreeType2 engine is a free and portable TrueType font rendering engine. It has been developed to provide TT support to a great variety of platforms and environments. Note that FreeType2 is a library, not a stand-alone application, though some utility applications are included %package lib64mysql18 lib64mysqld0 lib64mysql-devel lib64mysqlservices0 lib64mysql-static-devel mysql mysql-bench mysql-client mysql-common mysql-common-core mysql-core Update: Tue Feb 05 14:22:04 2013 Importance: security ID: MDVSA-2013:007 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2013:007 %pre This is a maintenance and bugfix release that upgrades mysql to the latest version which resolves various upstream bugs and a total of 18 security related bugs (CVE-2012-0572, CVE-2012-0574, CVE-2012-0578, CVE-2012-1702, CVE-2012-1705, CVE-2012-5060, CVE-2012-5096, CVE-2012-5611, CVE-2012-5612, CVE-2013-0367, CVE-2013-0368, CVE-2013-0371, CVE-2013-0375, CVE-2013-0383, CVE-2013-0384, CVE-2013-0385, CVE-2013-0386, CVE-2013-0389). Please consult the Oracle security matrix for further information regarding these security issues and the MySQL release notes. %description The MySQL(TM) software delivers a very fast, multi-threaded, multi-user, and robust SQL (Structured Query Language) database server. MySQL Server is intended for mission-critical, heavy-load production systems as well as for embedding into mass-deployed software. MySQL is a trademark of MySQL AB. The mysql server is compiled with the following storage engines: - InnoDB Storage Engine - Archive Storage Engine - CSV Storage Engine - Federated Storage Engine - User Defined Functions (UDFs). - Blackhole Storage Engine - Partition Storage Engine - Perfschema Storage Engine %package lib64ssh4 lib64ssh-devel Update: Sat Feb 09 10:33:51 2013 Importance: security ID: MDVSA-2013:009 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2013:009 %pre A vulnerability has been found and corrected in libssh: The publickey_from_privatekey function in libssh before 0.5.4, when no algorithm is matched during negotiations, allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a Client: Diffie-Hellman Key Exchange Init packet (CVE-2013-0176). The updated packages have been upgraded to the 0.5.4 version which is not affected by this issue. %description The ssh library was designed to be used by programmers needing a working SSH implementation by the mean of a library. The complete control of the client is made by the programmer. With libssh, you can remotely execute programs, transfer files, use a secure and transparent tunnel for your remote programs. With its Secure FTP implementation, you can play with remote files easily, without third-party programs others than libcrypto (from openssl). libssh features : * Full C library functions for manipulating a client-side SSH connection * Lesser GPL licensing -SSH2 protocol compliant * Fully configurable sessions * Support for AES-128,AES-192,AES-256,blowfish, in cbc mode * Use multiple SSH connections in a same process, at same time * Use multiple channels in the same connection * Thread safety when using different sessions at same time * Basic but correct SFTP implementation (secure file transfer) * RSA and DSS server public key supported * Compression support (with zlib) * Public key (RSA and DSS), password and keyboard-interactive authentication * Complete documentation about its API * Runs and tested under amd64, x86, arm, sparc32, ppc under Linux, BSD, MacosX and Solaris * A developer listening to you * It's free (LGPL)! %package java-1.6.0-openjdk java-1.6.0-openjdk-demo java-1.6.0-openjdk-devel java-1.6.0-openjdk-javadoc java-1.6.0-openjdk-src Update: Mon Feb 11 15:14:20 2013 Importance: security ID: MDVSA-2013:010 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2013:010 %pre Multiple security issues were identified and fixed in OpenJDK (icedtea6): * S6563318, CVE-2013-0424: RMI data sanitization * S6664509, CVE-2013-0425: Add logging context * S6664528, CVE-2013-0426: Find log level matching its name or value given at construction time * S6776941: CVE-2013-0427: Improve thread pool shutdown * S7141694, CVE-2013-0429: Improving CORBA internals * S7173145: Improve in-memory representation of splashscreens * S7186945: Unpack200 improvement * S7186946: Refine unpacker resource usage * S7186948: Improve Swing data validation * S7186952, CVE-2013-0432: Improve clipboard access * S7186954: Improve connection performance * S7186957: Improve Pack200 data validation * S7192392, CVE-2013-0443: Better validation of client keys * S7192393, CVE-2013-0440: Better Checking of order of TLS Messages * S7192977, CVE-2013-0442: Issue in toolkit thread * S7197546, CVE-2013-0428: (proxy) Reflect about creating reflective proxies * S7200491: Tighten up JTable layout code * S7200500: Launcher better input validation * S7201064: Better dialogue checking * S7201066, CVE-2013-0441: Change modifiers on unused fields * S7201068, CVE-2013-0435: Better handling of UI elements * S7201070: Serialization to conform to protocol * S7201071, CVE-2013-0433: InetSocketAddress serialization issue * S8000210: Improve JarFile code quality * S8000537, CVE-2013-0450: Contextualize RequiredModelMBean class * S8000540, CVE-2013-1475: Improve IIOP type reuse management * S8000631, CVE-2013-1476: Restrict access to class constructor * S8001235, CVE-2013-0434: Improve JAXP HTTP handling * S8001242: Improve RMI HTTP conformance * S8001307: Modify ACC_SUPER behavior * S8001972, CVE-2013-1478: Improve image processing * S8002325, CVE-2013-1480: Improve management of images * Backports * S7010849: 5/5 Extraneous javac source/target options when building sa-jdi The updated packages provides icedtea6-1.11.6 which is not vulnerable to these issues. %description The OpenJDK runtime environment. %package lib64netapi0 lib64netapi-devel lib64smbclient0 lib64smbclient0-devel lib64smbclient0-static-devel lib64smbsharemodes0 lib64smbsharemodes-devel lib64wbclient0 lib64wbclient-devel mount-cifs nss_wins samba-client samba-common samba-doc samba-domainjoin-gui samba-server samba-swat samba-winbind Update: Wed Feb 13 11:51:11 2013 Importance: security ID: MDVSA-2013:011 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2013:011 %pre Multiple vulnerabilities has been found and corrected in samba (swat): The Samba Web Administration Tool (SWAT) in Samba 3.x before 3.5.21, 3.6.x before 3.6.12, and 4.x before 4.0.2 allows remote attackers to conduct clickjacking attacks via a (1) FRAME or (2) IFRAME element (CVE-2013-0213). Cross-site request forgery (CSRF) vulnerability in the Samba Web Administration Tool (SWAT) in Samba 3.x before 3.5.21, 3.6.x before 3.6.12, and 4.x before 4.0.2 allows remote attackers to hijack the authentication of arbitrary users by leveraging knowledge of a password and composing requests that perform SWAT actions (CVE-2013-0214). The updated packages have been patched to correct these issues. %description Samba provides an SMB server which can be used to provide network services to SMB (sometimes called "Lan Manager") clients, including various versions of MS Windows, OS/2, and other Linux machines. Samba also provides some SMB clients, which complement the built-in SMB filesystem in Linux. Samba uses NetBIOS over TCP/IP (NetBT) protocols and does NOT need NetBEUI (Microsoft Raw NetBIOS frame) protocol. Samba-3.0 features working NT Domain Control capability and includes the SWAT (Samba Web Administration Tool) that allows samba's smb.conf file to be remotely managed using your favourite web browser. For the time being this is being enabled on TCP port 901 via xinetd. SWAT is now included in it's own subpackage, samba-swat. Please refer to the WHATSNEW.txt document for fixup information. This binary release includes encrypted password support. Please read the smb.conf file and ENCRYPTION.txt in the docs directory for implementation details. %package lib64ecpg9.0_6 lib64pq9.0_5 postgresql9.0 postgresql9.0-contrib postgresql9.0-devel postgresql9.0-docs postgresql9.0-pl postgresql9.0-plperl postgresql9.0-plpgsql postgresql9.0-plpython postgresql9.0-pltcl postgresql9.0-server Update: Fri Feb 15 14:56:42 2013 Importance: security ID: MDVSA-2013:012 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2013:012 %pre A vulnerability has been discovered and corrected in postgresql: PostgreSQL 9.2.x before 9.2.3, 9.1.x before 9.1.8, 9.0.x before 9.0.12, 8.4.x before 8.4.16, and 8.3.x before 8.3.23 does not properly declare the enum_recv function in backend/utils/adt/enum.c, which causes it to be invoked with incorrect arguments and allows remote authenticated users to cause a denial of service (server crash) or read sensitive process memory via a crafted SQL command, which triggers an array index error and an out-of-bounds read (CVE-2013-0255). This advisory provides the latest versions of PostgreSQL that is not vulnerable to these issues. %description PostgreSQL is an advanced Object-Relational database management system (DBMS) that supports almost all SQL constructs (including transactions, subselects and user-defined types and functions). The postgresql package includes the client programs and libraries that you'll need to access a PostgreSQL DBMS server. These PostgreSQL client programs are programs that directly manipulate the internal structure of PostgreSQL databases on a PostgreSQL server. These client programs can be located on the same machine with the PostgreSQL server, or may be on a remote machine which accesses a PostgreSQL server over a network connection. This package contains the client libraries for C and C++, as well as command-line utilities for managing PostgreSQL databases on a PostgreSQL server. If you want to manipulate a PostgreSQL database on a remote PostgreSQL server, you need this package. You also need to install this package if you're installing the postgresql-server package. %package squid squid-cachemgr Update: Wed Feb 20 11:33:48 2013 Importance: security ID: MDVSA-2013:013 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2013:013 %pre Multiple vulnerabilities has been found and corrected in squid (cachemgr.cgi): Multiple memory leaks in tools/cachemgr.cc in cachemgr.cgi in Squid 2.x and 3.x before 3.1.22, 3.2.x before 3.2.4, and 3.3.x before 3.3.0.2 allow remote attackers to cause a denial of service (memory consumption) via (1) invalid Content-Length headers, (2) long POST requests, or (3) crafted authentication credentials (CVE-2012-5643). cachemgr.cgi in Squid 3.1.x and 3.2.x, possibly 3.1.22, 3.2.4, and other versions, allows remote attackers to cause a denial of service (resource consumption) via a crafted request. NOTE: this issue is due to an incorrect fix for CVE-2012-5643, possibly involving an incorrect order of arguments or incorrect comparison (CVE-2013-0189). The updated packages have been patched to correct these issues. %description Squid is a high-performance proxy caching server for web clients, supporting FTP, gopher, and HTTP data objects over IPv4 or IPv6. Unlike traditional caching software, Squid handles all requests in a single, non-blocking, asynchronous process. Squid keeps meta data and especially hot objects cached in RAM, caches DNS lookups, supports non-blocking DNS lookups, and implements negative caching of failed requests. Squid supports SSL, extensive access controls, and full request logging. By using the lightweight Internet Cache Protocol (ICP) and HTTP Cache Protocol (HTCP) Squid caches can be arranged in a hierarchy or mesh for additional bandwidth savings. Install squid if you need a proxy caching server. This package defaults to a maximum of 8192 filedescriptors. You can change these values at build time by using for example: --define 'maxfiles 4096' The package was built to support a maximum of 8192 filedescriptors. You can build squid with some conditional build swithes; (ie. use with rpm --rebuild): --with[out] test Initiate the test suite %package java-1.6.0-openjdk java-1.6.0-openjdk-demo java-1.6.0-openjdk-devel java-1.6.0-openjdk-javadoc java-1.6.0-openjdk-src Update: Fri Feb 22 14:24:06 2013 Importance: security ID: MDVSA-2013:014 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2013:014 %pre Multiple security issues were identified and fixed in OpenJDK (icedtea6): * S8006446: Restrict MBeanServer access * S8006777: Improve TLS handling of invalid messages * S8007688: Blacklist known bad certificate * S7123519: problems with certification path * S8007393: Possible race condition after JDK-6664509 * S8007611: logging behavior in applet changed The updated packages provides icedtea6-1.11.8 which is not vulnerable to these issues. %description The OpenJDK runtime environment. %package apache-base apache-conf apache-devel apache-doc apache-htcacheclean apache-mod_authn_dbd apache-mod_cache apache-mod_dav apache-mod_dbd apache-mod_deflate apache-mod_disk_cache apache-mod_file_cache apache-mod_ldap apache-mod_mem_cache apache-mod_proxy apache-mod_proxy_ajp apache-mod_proxy_scgi apache-mod_reqtimeout apache-mod_ssl apache-mod_suexec apache-modules apache-mod_userdir apache-mpm-event apache-mpm-itk apache-mpm-peruser apache-mpm-prefork apache-mpm-worker apache-source Update: Tue Feb 26 09:11:36 2013 Importance: security ID: MDVSA-2013:015 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2013:015 %pre Multiple vulnerabilities has been found and corrected in apache (ASF HTTPD): Various XSS (cross-site scripting vulnerability) flaws due to unescaped hostnames and URIs HTML output in mod_info, mod_status, mod_imagemap, mod_ldap, and mod_proxy_ftp (CVE-2012-3499). XSS (cross-site scripting vulnerability) in mod_proxy_balancer manager interface (CVE-2012-4558). Additionally the ASF bug 53219 was resolved which provides a way to mitigate the CRIME attack vulnerability by disabling TLS-level compression. Use the new directive SSLCompression on|off to enable or disable TLS-level compression, by default SSLCompression is turned on. The updated packages have been upgraded to the latest 2.2.24 version which is not vulnerable to these issues. %description This package contains the main binary of apache, a powerful, full-featured, efficient and freely-available Web server. Apache is also the most popular Web server on the Internet. This version of apache is fully modular, and many modules are available in pre-compiled formats, like PHP and mod_auth_external. This package defaults to a maximum of 128 dynamically loadable modules. This package defaults to a ServerLimit of 1024. You can change these values at RPM build time by using for example: --define 'maxmodules 512' --define 'serverlimit 2048' The package was built to support a maximum of 128 dynamically loadable modules. The package was built with a ServerLimit of 1024. %package apache-mod_php lib64php5_common5 php-apc php-apc-admin php-bcmath php-bz2 php-calendar php-cgi php-cli php-ctype php-curl php-dba php-devel php-doc php-dom php-eaccelerator php-eaccelerator-admin php-enchant php-exif php-fileinfo php-filter php-fpm php-ftp php-gd php-gettext php-gmp php-hash php-iconv php-imap php-ini php-intl php-json php-ldap php-mbstring php-mcrypt php-mssql php-mysql php-mysqli php-mysqlnd php-odbc php-openssl php-pcntl php-pdo php-pdo_dblib php-pdo_mysql php-pdo_odbc php-pdo_pgsql php-pdo_sqlite php-pgsql php-phar php-posix php-pspell php-readline php-recode php-session php-shmop php-snmp php-soap php-sockets php-sqlite3 php-sqlite php-sybase_ct php-sysvmsg php-sysvsem php-sysvshm php-tidy php-tokenizer php-wddx php-xml php-xmlreader php-xmlrpc php-xmlwriter php-xsl php-zip php-zlib Update: Thu Feb 28 10:53:26 2013 Importance: security ID: MDVSA-2013:016 URL: http://www.mandriva.com/security/advisories?name=MDVSA-2013:016 %pre Multiple vulnerabilities has been discovered and corrected in php: PHP does not validate the configration directive soap.wsdl_cache_dir before writing SOAP wsdl cache files to the filesystem. Thus an attacker is able to write remote wsdl files to arbitrary locations (CVE-2013-1635). PHP allows the use of external entities while parsing SOAP wsdl files which allows an attacker to read arbitrary files. If a web application unserializes user-supplied data and tries to execute any method of it, an attacker can send serialized SoapClient object initialized in non-wsdl mode which will make PHP to parse automatically remote XML-document specified in the location option parameter (CVE-2013-1643). The updated packages have been upgraded to the 5.3.22 version which is not vulnerable to these issues. Additionally, some packages which requires so has been rebuilt for php-5.3.22. %description PHP5 is an HTML-embeddable scripting language. PHP5 offers built-in database integration for several commercial and non-commercial database management systems, so writing a database-enabled script with PHP5 is fairly simple. The most common use of PHP5 coding is probably as a replacement for CGI scripts. This version of php has the suhosin patch 0.9.10 applied. Please report bugs here: http://qa.mandriva.com/ so that the official maintainer of this Mandriva package can help you. More information regarding the suhosin patch 0.9.10 here: http://www.suhosin.org/