[ MDVSA-2014:105 ] openssl

2014-06-10 Thread security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 ___

 Mandriva Linux Security Advisory MDVSA-2014:105
 http://www.mandriva.com/en/support/security/
 ___

 Package : openssl
 Date: June 9, 2014
 Affected: Enterprise Server 5.0
 ___

 Problem Description:

 Multiple vulnerabilities has been discovered and corrected in openssl:
 
 The dtls1_get_message_fragment function in d1_both.c in OpenSSL before
 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h allows remote
 attackers to cause a denial of service (recursion and client crash)
 via a DTLS hello message in an invalid DTLS handshake (CVE-2014-0221).
 
 OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before
 1.0.1h does not properly restrict processing of ChangeCipherSpec
 messages, which allows man-in-the-middle attackers to trigger use of a
 zero-length master key in certain OpenSSL-to-OpenSSL communications,
 and consequently hijack sessions or obtain sensitive information,
 via a crafted TLS handshake, aka the CCS Injection vulnerability
 (CVE-2014-0224).
 
 The ssl3_send_client_key_exchange function in s3_clnt.c in OpenSSL
 before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h, when
 an anonymous ECDH cipher suite is used, allows remote attackers to
 cause a denial of service (NULL pointer dereference and client crash)
 by triggering a NULL certificate value (CVE-2014-3470).
 
 The updated packages have been patched to correct these issues.
 ___

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0221
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0224
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3470
 http://www.openssl.org/news/secadv_20140605.txt
 ___

 Updated Packages:

 Mandriva Enterprise Server 5:
 ef1687f8f4d68dd34149dbb04f3fccda  
mes5/i586/libopenssl0.9.8-0.9.8h-3.18mdvmes5.2.i586.rpm
 3e46ee354bd0add0234eaf873f0a076c  
mes5/i586/libopenssl0.9.8-devel-0.9.8h-3.18mdvmes5.2.i586.rpm
 0cc60393474d11a3786965d780e39ebc  
mes5/i586/libopenssl0.9.8-static-devel-0.9.8h-3.18mdvmes5.2.i586.rpm
 16d367fe394b2f16b9f022ea7ba75a54  
mes5/i586/openssl-0.9.8h-3.18mdvmes5.2.i586.rpm 
 223a4a6b80f1b2eb3cbfaf99473423f3  
mes5/SRPMS/openssl-0.9.8h-3.18mdvmes5.2.src.rpm

 Mandriva Enterprise Server 5/X86_64:
 85a51b41a45f6905ea778347d8b236c1  
mes5/x86_64/lib64openssl0.9.8-0.9.8h-3.18mdvmes5.2.x86_64.rpm
 d0bf9ef6c6e33d0c6158add14cbe04b8  
mes5/x86_64/lib64openssl0.9.8-devel-0.9.8h-3.18mdvmes5.2.x86_64.rpm
 707842b93162409157667f696996f4fc  
mes5/x86_64/lib64openssl0.9.8-static-devel-0.9.8h-3.18mdvmes5.2.x86_64.rpm
 70f4de1608d99c970afa1786595a761d  
mes5/x86_64/openssl-0.9.8h-3.18mdvmes5.2.x86_64.rpm 
 223a4a6b80f1b2eb3cbfaf99473423f3  
mes5/SRPMS/openssl-0.9.8h-3.18mdvmes5.2.src.rpm
 ___

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/en/support/security/advisories/

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 ___

 Type Bits/KeyID Date   User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  security*mandriva.com
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.12 (GNU/Linux)

iD8DBQFTlcOfmqjQ0CJFipgRAj2XAJ0ZZpPmhFDRDja0146szOkK/8mqYwCfTV4s
D5C6zRDfJm1loSlN9RoOzgE=
=JhLX
-END PGP SIGNATURE-



[SECURITY] [DSA 2954-1] dovecot security update

2014-06-10 Thread Salvatore Bonaccorso
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512

- -
Debian Security Advisory DSA-2954-1   secur...@debian.org
http://www.debian.org/security/  Salvatore Bonaccorso
June 09, 2014  http://www.debian.org/security/faq
- -

Package: dovecot
CVE ID : CVE-2014-3430
Debian Bug : 747549

It was discovered that the Dovecot email server is vulnerable to a
denial of service attack against imap/pop3-login processes due to
incorrect handling of the closure of inactive SSL/TLS connections.

For the stable distribution (wheezy), this problem has been fixed in
version 1:2.1.7-7+deb7u1.

For the testing distribution (jessie), this problem has been fixed in
version 1:2.2.13~rc1-1.

For the unstable distribution (sid), this problem has been fixed in
version 1:2.2.13~rc1-1.

We recommend that you upgrade your dovecot packages.

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: http://www.debian.org/security/

Mailing list: debian-security-annou...@lists.debian.org
-BEGIN PGP SIGNATURE-
Version: GnuPG v1
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=y6t5
-END PGP SIGNATURE-



[ MDVSA-2014:106 ] openssl

2014-06-10 Thread security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 ___

 Mandriva Linux Security Advisory MDVSA-2014:106
 http://www.mandriva.com/en/support/security/
 ___

 Package : openssl
 Date: June 9, 2014
 Affected: Business Server 1.0
 ___

 Problem Description:

 Multiple vulnerabilities has been discovered and corrected in openssl:
 
 The dtls1_reassemble_fragment function in d1_both.c in OpenSSL
 before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does
 not properly validate fragment lengths in DTLS ClientHello messages,
 which allows remote attackers to execute arbitrary code or cause a
 denial of service (buffer overflow and application crash) via a long
 non-initial fragment (CVE-2014-0195).
 
 The dtls1_get_message_fragment function in d1_both.c in OpenSSL before
 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h allows remote
 attackers to cause a denial of service (recursion and client crash)
 via a DTLS hello message in an invalid DTLS handshake (CVE-2014-0221).
 
 OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before
 1.0.1h does not properly restrict processing of ChangeCipherSpec
 messages, which allows man-in-the-middle attackers to trigger use of a
 zero-length master key in certain OpenSSL-to-OpenSSL communications,
 and consequently hijack sessions or obtain sensitive information,
 via a crafted TLS handshake, aka the CCS Injection vulnerability
 (CVE-2014-0224).
 
 The ssl3_send_client_key_exchange function in s3_clnt.c in OpenSSL
 before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h, when
 an anonymous ECDH cipher suite is used, allows remote attackers to
 cause a denial of service (NULL pointer dereference and client crash)
 by triggering a NULL certificate value (CVE-2014-3470).
 
 The updated packages have been upgraded to the 1.0.0m version where
 these security flaws has been fixed.
 ___

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0195
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0221
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0224
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3470
 http://www.openssl.org/news/secadv_20140605.txt
 ___

 Updated Packages:

 Mandriva Business Server 1/X86_64:
 857d06ddc6423ad124b23eb760459033  
mbs1/x86_64/lib64openssl1.0.0-1.0.0m-1.mbs1.x86_64.rpm
 d7436f2f95df5c1d64d44a745f125bd8  
mbs1/x86_64/lib64openssl-devel-1.0.0m-1.mbs1.x86_64.rpm
 67f6cd6da42f01fb2f6054a2f96872af  
mbs1/x86_64/lib64openssl-engines1.0.0-1.0.0m-1.mbs1.x86_64.rpm
 5d7c5712c1ce70a2dd2596e803bc7004  
mbs1/x86_64/lib64openssl-static-devel-1.0.0m-1.mbs1.x86_64.rpm
 9866e03e1c112b0c4cb5587b142cfa63  mbs1/x86_64/openssl-1.0.0m-1.mbs1.x86_64.rpm 
 9ac714afa9a9b30419f2f1f5c9ec4e48  mbs1/SRPMS/openssl-1.0.0m-1.mbs1.src.rpm
 ___

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/en/support/security/advisories/

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 ___

 Type Bits/KeyID Date   User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  security*mandriva.com
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.12 (GNU/Linux)

iD8DBQFTlcuxmqjQ0CJFipgRAtEQAJsEeYwuETVPTeadp+pdK9wJfQqgOgCfXDif
30xyBHFmHJa6MS/00iqN2aY=
=9sdw
-END PGP SIGNATURE-



[ MDVSA-2014:107 ] libtasn1

2014-06-10 Thread security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 ___

 Mandriva Linux Security Advisory MDVSA-2014:107
 http://www.mandriva.com/en/support/security/
 ___

 Package : libtasn1
 Date: June 9, 2014
 Affected: Business Server 1.0, Enterprise Server 5.0
 ___

 Problem Description:

 Updated libtasn1 packages fix security vulnerabilities:
 
 Multiple buffer boundary check issues were discovered in libtasn1
 library, causing it to read beyond the boundary of an allocated buffer.
 An untrusted ASN.1 input could cause an application using the library
 to crash (CVE-2014-3467).
 
 It was discovered that libtasn1 library function asn1_get_bit_der()
 could incorrectly report negative bit length of the value read from
 ASN.1 input. This could possibly lead to an out of bounds access in
 an application using libtasn1, for example in case if application
 tried to terminate read value with NUL byte (CVE-2014-3468).
 
 A NULL pointer dereference flaw was found in libtasn1#039;s
 asn1_read_value_type() / asn1_read_value() function. If an application
 called the function with a NULL value for an ivalue argument to
 determine the amount of memory needed to store data to be read from
 the ASN.1 input, libtasn1 could incorrectly attempt to dereference
 the NULL pointer, causing an application using the library to crash
 (CVE-2014-3469).
 
 The packages for mes5 have been patched to correct these issues and
 the packages for mbs1 have been upgraded to the 3.6 version where
 these issues has been fixed.
 ___

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3467
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3468
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3469
 http://advisories.mageia.org/MGASA-2014-0247.html
 ___

 Updated Packages:

 Mandriva Enterprise Server 5:
 add1919dbd2a76f2afea69ec5b1ac4aa  
mes5/i586/libtasn1_3-1.5-2.2mdvmes5.2.i586.rpm
 6f9d6496e709d28388fba42b36ba03bb  
mes5/i586/libtasn1-devel-1.5-2.2mdvmes5.2.i586.rpm
 bd5bee278b0bf78f0cc5c4804912db49  
mes5/i586/libtasn1-tools-1.5-2.2mdvmes5.2.i586.rpm 
 8a020997dbaae6ab4796a44a93a00da3  mes5/SRPMS/libtasn1-1.5-2.2mdvmes5.2.src.rpm

 Mandriva Enterprise Server 5/X86_64:
 d3ad6c9991e31c780bfd8f518c6f3c20  
mes5/x86_64/lib64tasn1_3-1.5-2.2mdvmes5.2.x86_64.rpm
 227253880eb5046d549a7a46483394b4  
mes5/x86_64/lib64tasn1-devel-1.5-2.2mdvmes5.2.x86_64.rpm
 da82e349ee924a3306ffb03730557438  
mes5/x86_64/libtasn1-tools-1.5-2.2mdvmes5.2.x86_64.rpm 
 8a020997dbaae6ab4796a44a93a00da3  mes5/SRPMS/libtasn1-1.5-2.2mdvmes5.2.src.rpm

 Mandriva Business Server 1/X86_64:
 46535ab567d7ded71f9e18d8eabd3256  
mbs1/x86_64/lib64tasn1_6-3.6-1.3.mbs1.x86_64.rpm
 e49f8229aaacd8f678366c163b9fa357  
mbs1/x86_64/lib64tasn1-devel-3.6-1.3.mbs1.x86_64.rpm
 a07b7cf179a799d3a77e62d0e27857d2  
mbs1/x86_64/libtasn1-tools-3.6-1.3.mbs1.x86_64.rpm 
 bcca682662591cfc74148435ed2f5cb0  mbs1/SRPMS/libtasn1-3.6-1.3.mbs1.src.rpm
 ___

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/en/support/security/advisories/

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 ___

 Type Bits/KeyID Date   User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  security*mandriva.com
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.12 (GNU/Linux)

iD8DBQFTldgfmqjQ0CJFipgRAmryAJwNEt/Ry4LoRTh2EYAkCDcJovkamgCeLVDY
60hiEXXSq1Jhlp7EvxFVJj8=
=FcbR
-END PGP SIGNATURE-



[ MDVSA-2014:109 ] gnutls

2014-06-10 Thread security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 ___

 Mandriva Linux Security Advisory MDVSA-2014:109
 http://www.mandriva.com/en/support/security/
 ___

 Package : gnutls
 Date: June 9, 2014
 Affected: Enterprise Server 5.0
 ___

 Problem Description:

 Updated gnutls packages fix security vulnerability:
 
 A flaw was found in the way GnuTLS parsed session ids from Server
 Hello packets of the TLS/SSL handshake.  A malicious server could use
 this flaw to send an excessively long session id value and trigger a
 buffer overflow in a connecting TLS/SSL client using GnuTLS, causing
 it to crash or, possibly, execute arbitrary code (CVE-2014-3466).
 ___

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3466
 http://advisories.mageia.org/MGASA-2014-0248.html
 ___

 Updated Packages:

 Mandriva Enterprise Server 5:
 a2d9b9de428cb4c54e4431ac3b90bc7c  mes5/i586/gnutls-2.4.1-2.11mdvmes5.2.i586.rpm
 0aeec587dd6e38321e6e1a029895933b  
mes5/i586/libgnutls26-2.4.1-2.11mdvmes5.2.i586.rpm
 40af11121bc70873fc337e3f0ac513e2  
mes5/i586/libgnutls-devel-2.4.1-2.11mdvmes5.2.i586.rpm 
 d74c6d27f23aab10769777ada47f1174  mes5/SRPMS/gnutls-2.4.1-2.11mdvmes5.2.src.rpm

 Mandriva Enterprise Server 5/X86_64:
 3bc708d509ad98855875dcd21159db20  
mes5/x86_64/gnutls-2.4.1-2.11mdvmes5.2.x86_64.rpm
 bb5968c312979ac7c706949420c37b34  
mes5/x86_64/lib64gnutls26-2.4.1-2.11mdvmes5.2.x86_64.rpm
 390db75387d13706a7839c6e9d0283c2  
mes5/x86_64/lib64gnutls-devel-2.4.1-2.11mdvmes5.2.x86_64.rpm 
 d74c6d27f23aab10769777ada47f1174  mes5/SRPMS/gnutls-2.4.1-2.11mdvmes5.2.src.rpm
 ___

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/en/support/security/advisories/

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 ___

 Type Bits/KeyID Date   User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  security*mandriva.com
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.12 (GNU/Linux)

iD8DBQFTldvRmqjQ0CJFipgRAgv2AJ92OmTNZTwJbeCvI7BWxwrrXRx1xgCg0HaM
tf2MKexJnpBnQ7VcYXCakq0=
=nakX
-END PGP SIGNATURE-



[ MDVSA-2014:108 ] gnutls

2014-06-10 Thread security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 ___

 Mandriva Linux Security Advisory MDVSA-2014:108
 http://www.mandriva.com/en/support/security/
 ___

 Package : gnutls
 Date: June 9, 2014
 Affected: Business Server 1.0
 ___

 Problem Description:

 Updated gnutls packages fix security vulnerabilities:
 
 A NULL pointer dereference flaw was discovered in GnuTLS#039;s
 gnutls_x509_dn_oid_name().  The function, when called with the
 GNUTLS_X509_DN_OID_RETURN_OID flag, should not return NULL to its
 caller. However, it could previously return NULL when parsed X.509
 certificates included specific OIDs (CVE-2014-3465).
 
 A flaw was found in the way GnuTLS parsed session ids from Server
 Hello packets of the TLS/SSL handshake.  A malicious server could use
 this flaw to send an excessively long session id value and trigger a
 buffer overflow in a connecting TLS/SSL client using GnuTLS, causing
 it to crash or, possibly, execute arbitrary code (CVE-2014-3466).
 ___

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3465
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3466
 http://advisories.mageia.org/MGASA-2014-0248.html
 ___

 Updated Packages:

 Mandriva Business Server 1/X86_64:
 e9d619b4d917c9e322c43e1589e00cf9  mbs1/x86_64/gnutls-3.0.28-1.7.mbs1.x86_64.rpm
 ba96fe08901ad527c4a9be1985429301  
mbs1/x86_64/lib64gnutls28-3.0.28-1.7.mbs1.x86_64.rpm
 dacba924eeafab91fd6215da5820c11e  
mbs1/x86_64/lib64gnutls-devel-3.0.28-1.7.mbs1.x86_64.rpm
 bbbdad730440b4fdfa1d1903c90f008d  
mbs1/x86_64/lib64gnutls-ssl27-3.0.28-1.7.mbs1.x86_64.rpm 
 169be2c8e116c6e639ca981233ef3b7a  mbs1/SRPMS/gnutls-3.0.28-1.7.mbs1.src.rpm
 ___

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/en/support/security/advisories/

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 ___

 Type Bits/KeyID Date   User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  security*mandriva.com
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.12 (GNU/Linux)

iD8DBQFTldtJmqjQ0CJFipgRAuYJAKCuDqqqMfnj1NlfVM2wR7GzNsd/pgCeKrIf
hnMh1JBwllVk1L+UCLa6jfs=
=u0HM
-END PGP SIGNATURE-



[slackware-security] php (SSA:2014-160-01)

2014-06-10 Thread Slackware Security Team

-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

[slackware-security]  php (SSA:2014-160-01)

New php packages are available for Slackware 13.0, 13.1, 13.37, 14.0, 14.1,
and -current to fix security issues.


Here are the details from the Slackware 14.1 ChangeLog:
+--+
patches/packages/php-5.4.29-i486-1_slack14.1.txz:  Upgraded.
  This update fixes bugs and security issues, including a possible denial
  of service, and an issue where insecure default permissions on the FPM
  socket may allow local users to run arbitrary code as the apache user.
  For more information, see:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0185
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0237
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0238
  (* Security fix *)
+--+


Where to find the new packages:
+-+

Thanks to the friendly folks at the OSU Open Source Lab
(http://osuosl.org) for donating FTP and rsync hosting
to the Slackware project!  :-)

Also see the Get Slack section on http://slackware.com for
additional mirror sites near you.

Updated package for Slackware 13.0:
ftp://ftp.slackware.com/pub/slackware/slackware-13.0/patches/packages/php-5.3.28-i486-1_slack13.0.txz

Updated package for Slackware x86_64 13.0:
ftp://ftp.slackware.com/pub/slackware/slackware64-13.0/patches/packages/php-5.3.28-x86_64-1_slack13.0.txz

Updated package for Slackware 13.1:
ftp://ftp.slackware.com/pub/slackware/slackware-13.1/patches/packages/php-5.3.28-i486-1_slack13.1.txz

Updated package for Slackware x86_64 13.1:
ftp://ftp.slackware.com/pub/slackware/slackware64-13.1/patches/packages/php-5.3.28-x86_64-1_slack13.1.txz

Updated package for Slackware 13.37:
ftp://ftp.slackware.com/pub/slackware/slackware-13.37/patches/packages/php-5.3.28-i486-1_slack13.37.txz

Updated package for Slackware x86_64 13.37:
ftp://ftp.slackware.com/pub/slackware/slackware64-13.37/patches/packages/php-5.3.28-x86_64-1_slack13.37.txz

Updated package for Slackware 14.0:
ftp://ftp.slackware.com/pub/slackware/slackware-14.0/patches/packages/php-5.4.29-i486-1_slack14.0.txz

Updated package for Slackware x86_64 14.0:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.0/patches/packages/php-5.4.29-x86_64-1_slack14.0.txz

Updated package for Slackware 14.1:
ftp://ftp.slackware.com/pub/slackware/slackware-14.1/patches/packages/php-5.4.29-i486-1_slack14.1.txz

Updated package for Slackware x86_64 14.1:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.1/patches/packages/php-5.4.29-x86_64-1_slack14.1.txz

Updated package for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/php-5.4.29-i486-1.txz

Updated package for Slackware x86_64 -current:
ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/n/php-5.4.29-x86_64-1.txz


MD5 signatures:
+-+

Slackware 13.0 package:
ccea945b3f2148537e32262056c6baf3  php-5.3.28-i486-1_slack13.0.txz

Slackware x86_64 13.0 package:
538810888d000fc5c9d9c89eebcd98ca  php-5.3.28-x86_64-1_slack13.0.txz

Slackware 13.1 package:
dcddf3bab56b9c384dc68f6d8ddac784  php-5.3.28-i486-1_slack13.1.txz

Slackware x86_64 13.1 package:
8d9211b49b895c96feba41b1d035004f  php-5.3.28-x86_64-1_slack13.1.txz

Slackware 13.37 package:
28280a25871c27ed5c1a4be5d53f7640  php-5.3.28-i486-1_slack13.37.txz

Slackware x86_64 13.37 package:
4a4be5f6e1731a9c45f58063d7dd19f0  php-5.3.28-x86_64-1_slack13.37.txz

Slackware 14.0 package:
2eb778df214832e87f3a605a65ee82ec  php-5.4.29-i486-1_slack14.0.txz

Slackware x86_64 14.0 package:
b18c187d6be6cb63f08744d3f93d9c35  php-5.4.29-x86_64-1_slack14.0.txz

Slackware 14.1 package:
36e8852834584501a5118800a3e944cb  php-5.4.29-i486-1_slack14.1.txz

Slackware x86_64 14.1 package:
eb6e16e0fc7e88939dc5ef8bfef5011f  php-5.4.29-x86_64-1_slack14.1.txz

Slackware -current package:
edf4ffd856eb50241a5847d405c4e87e  n/php-5.4.29-i486-1.txz

Slackware x86_64 -current package:
29b6e83289af8b31f1a27cb99e06078c  n/php-5.4.29-x86_64-1.txz


Installation instructions:
++

Upgrade the package as root:
# upgradepkg php-5.4.29-i486-1_slack14.1.txz

Then, restart Apache httpd:
# /etc/rc.d/rc.httpd stop
# /etc/rc.d/rc.httpd start


+-+

Slackware Linux Security Team
http://slackware.com/gpg-key
secur...@slackware.com

++
| To leave the slackware-security mailing list:  |
++
| Send an email to majord...@slackware.com with this text in the body of |
| the email message: |
||
|   unsubscribe slackware-security   |
||
| You will get a confirmation message 

[ MDVSA-2014:111 ] otrs

2014-06-10 Thread security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 ___

 Mandriva Linux Security Advisory MDVSA-2014:111
 http://www.mandriva.com/en/support/security/
 ___

 Package : otrs
 Date: June 10, 2014
 Affected: Business Server 1.0
 ___

 Problem Description:

 Updated otrs package fixes security vulnerabilities:
 
 A logged in attacker could insert special content in dynamic fields,
 leading to JavaScript code being executed in OTRS (CVE-2014-2553).
 
 An attacker could embed OTRS in a hidden iframe tag of another page,
 tricking the user into clicking links in OTRS (CVE-2014-2554).
 ___

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2553
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-2554
 http://advisories.mageia.org/MGASA-2014-0194.html
 ___

 Updated Packages:

 Mandriva Business Server 1/X86_64:
 705047cc0c626211bcc60881d3af1469  mbs1/x86_64/otrs-3.2.16-1.mbs1.noarch.rpm 
 a5c3626c92a00103fe916aff0690d791  mbs1/SRPMS/otrs-3.2.16-1.mbs1.src.rpm
 ___

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/en/support/security/advisories/

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 ___

 Type Bits/KeyID Date   User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  security*mandriva.com
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.12 (GNU/Linux)

iD8DBQFTlqXgmqjQ0CJFipgRAtJOAKDBhfF8OxMdFT7Pn5xx9Kk4i0jk2gCgme4t
LHmMYXhXLyl7XsCNh15EkxY=
=xUGC
-END PGP SIGNATURE-



[ MDVSA-2014:112 ] python-django

2014-06-10 Thread security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 ___

 Mandriva Linux Security Advisory MDVSA-2014:112
 http://www.mandriva.com/en/support/security/
 ___

 Package : python-django
 Date: June 10, 2014
 Affected: Enterprise Server 5.0
 ___

 Problem Description:

 Multiple vulnerabilities has been discovered and corrected in
 python-django:
 
 Django 1.4 before 1.4.13, 1.5 before 1.5.8, 1.6 before 1.6.5, and 1.7
 before 1.7b4 does not properly include the (1) Vary: Cookie or (2)
 Cache-Control header in responses, which allows remote attackers to
 obtain sensitive information or poison the cache via a request from
 certain browsers (CVE-2014-1418).
 
 The django.util.http.is_safe_url function in Django 1.4 before
 1.4.13, 1.5 before 1.5.8, 1.6 before 1.6.5, and 1.7 before 1.7b4
 does not properly validate URLs, which allows remote attackers to
 conduct open redirect attacks via a malformed URL, as demonstrated
 by http:\djangoproject.com. (CVE-2014-3730).
 
 The django.core.urlresolvers.reverse function in Django before 1.4.11,
 1.5.x before 1.5.6, 1.6.x before 1.6.3, and 1.7.x before 1.7 beta
 2 allows remote attackers to import and execute arbitrary Python
 modules by leveraging a view that constructs URLs using user input
 and a dotted Python path. (CVE-2014-0472).
 
 The caching framework in Django before 1.4.11, 1.5.x before 1.5.6,
 1.6.x before 1.6.3, and 1.7.x before 1.7 beta 2 reuses a cached
 CSRF token for all anonymous users, which allows remote attackers to
 bypass CSRF protections by reading the CSRF cookie for anonymous users
 (CVE-2014-0473).
 
 The (1) FilePathField, (2) GenericIPAddressField, and (3)
 IPAddressField model field classes in Django before 1.4.11,
 1.5.x before 1.5.6, 1.6.x before 1.6.3, and 1.7.x before 1.7 beta
 2 do not properly perform type conversion, which allows remote
 attackers to have unspecified impact and vectors, related to MySQL
 typecasting. (CVE-2014-0474).
 
 The updated packages have been patched to correct these issues.
 ___

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-1418
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3730
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0472
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0473
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0474
 ___

 Updated Packages:

 Mandriva Enterprise Server 5:
 56dc2f984f2f82fc8000a6823eaa8413  
mes5/i586/python-django-1.3.7-0.3mdvmes5.2.noarch.rpm 
 3395a6fca97c935c2d98d2d32cad9e14  
mes5/SRPMS/python-django-1.3.7-0.3mdvmes5.2.src.rpm

 Mandriva Enterprise Server 5/X86_64:
 1f6993703a66e4a050d922dce76ceb8c  
mes5/x86_64/python-django-1.3.7-0.3mdvmes5.2.noarch.rpm 
 3395a6fca97c935c2d98d2d32cad9e14  
mes5/SRPMS/python-django-1.3.7-0.3mdvmes5.2.src.rpm
 ___

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/en/support/security/advisories/

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 ___

 Type Bits/KeyID Date   User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  security*mandriva.com
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.12 (GNU/Linux)

iD8DBQFTlqxJmqjQ0CJFipgRAoppAJ48r1tyBrsBhwBC3ksnlYFApJXCBACgu/4Z
80F66i8fmTHg+g8N4aIuWyA=
=DOsW
-END PGP SIGNATURE-



[ MDVSA-2014:110 ] curl

2014-06-10 Thread security
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1

 ___

 Mandriva Linux Security Advisory MDVSA-2014:110
 http://www.mandriva.com/en/support/security/
 ___

 Package : curl
 Date: June 10, 2014
 Affected: Business Server 1.0, Enterprise Server 5.0
 ___

 Problem Description:

 Updated curl packages fix security vulnerabilities:
 
 Paras Sethia discovered that libcurl would sometimes mix up multiple
 HTTP and HTTPS connections with NTLM authentication to the same server,
 sending requests for one user over the connection authenticated as
 a different user (CVE-2014-0015).
 
 libcurl can in some circumstances re-use the wrong connection when
 asked to do transfers using other protocols than HTTP and FTP, causing
 a transfer that was initiated by an application to wrongfully re-use
 an existing connection to the same server that was authenticated
 using different credentials (CVE-2014-0138).
 
 libcurl incorrectly validates wildcard SSL certificates containing
 literal IP addresses, so under certain conditions, it would allow
 and use a wildcard match specified in the CN field, allowing a
 malicious server to participate in a MITM attack or just fool users
 into believing that it is a legitimate site (CVE-2014-0139).
 ___

 References:

 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0015
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0138
 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0139
 http://advisories.mageia.org/MGASA-2014-0153.html
 ___

 Updated Packages:

 Mandriva Enterprise Server 5:
 dbfc65c19ac0479b0f171fb2f57b7009  mes5/i586/curl-7.19.0-2.9mdvmes5.2.i586.rpm
 329ea6986634f8115f0f40189dafa13d  
mes5/i586/curl-examples-7.19.0-2.9mdvmes5.2.i586.rpm
 e90929468892b409168cbaaf5ccf7aa7  
mes5/i586/libcurl4-7.19.0-2.9mdvmes5.2.i586.rpm
 b76ba081a80e5305b3ea502331d339f1  
mes5/i586/libcurl-devel-7.19.0-2.9mdvmes5.2.i586.rpm 
 079bba263ad5eba412c40e97b088ff49  mes5/SRPMS/curl-7.19.0-2.9mdvmes5.2.src.rpm

 Mandriva Enterprise Server 5/X86_64:
 d51a98de165924c8eb83db16cd2a9de1  
mes5/x86_64/curl-7.19.0-2.9mdvmes5.2.x86_64.rpm
 2d6dba13c1b95fe6696ef618e6d2  
mes5/x86_64/curl-examples-7.19.0-2.9mdvmes5.2.x86_64.rpm
 3e92dcf0f85218afd68cdf12b81b7639  
mes5/x86_64/lib64curl4-7.19.0-2.9mdvmes5.2.x86_64.rpm
 035cea9d1c4d9f30e442113c1890da29  
mes5/x86_64/lib64curl-devel-7.19.0-2.9mdvmes5.2.x86_64.rpm 
 079bba263ad5eba412c40e97b088ff49  mes5/SRPMS/curl-7.19.0-2.9mdvmes5.2.src.rpm

 Mandriva Business Server 1/X86_64:
 59896a7f65dc52adff833b191c2ccd8d  mbs1/x86_64/curl-7.24.0-3.5.mbs1.x86_64.rpm
 c519acfcdfd464dce34e5d85642cddae  
mbs1/x86_64/curl-examples-7.24.0-3.5.mbs1.x86_64.rpm
 c9c4ccf43b0115c3faf24ae6c0a4ef51  
mbs1/x86_64/lib64curl4-7.24.0-3.5.mbs1.x86_64.rpm
 9d8d2a5cbffd1ba844d1a6c7837f2298  
mbs1/x86_64/lib64curl-devel-7.24.0-3.5.mbs1.x86_64.rpm 
 9dbb683a4ebda2ad649562fd66c9cb87  mbs1/SRPMS/curl-7.24.0-3.5.mbs1.src.rpm
 ___

 To upgrade automatically use MandrivaUpdate or urpmi.  The verification
 of md5 checksums and GPG signatures is performed automatically for you.

 All packages are signed by Mandriva for security.  You can obtain the
 GPG public key of the Mandriva Security Team by executing:

  gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

 You can view other update advisories for Mandriva Linux at:

  http://www.mandriva.com/en/support/security/advisories/

 If you want to report vulnerabilities, please contact

  security_(at)_mandriva.com
 ___

 Type Bits/KeyID Date   User ID
 pub  1024D/22458A98 2000-07-10 Mandriva Security Team
  security*mandriva.com
-BEGIN PGP SIGNATURE-
Version: GnuPG v1.4.12 (GNU/Linux)

iD8DBQFTlqBfmqjQ0CJFipgRAnnBAJ4iIKbK1jBxAtipngM1xlSflmpTUQCgsxIE
SB5lxqgllGcXWEW9SyPo/Fw=
=hggz
-END PGP SIGNATURE-