Gentoo Linux Security Advisory 201504-5 - Multiple vulnerabilities have been found in MySQL and MariaDB, the worst of which can allow remote attackers to cause a Denial of Service condition. Versions less than 5.6.22 are affected.
6e0a97b74303e09092922175c663be726c4b54fbe04de1ac7064b8d86bcccb5d
Gentoo Linux Security Advisory 201504-4 - Multiple vulnerabilities have been found in Xen, the worst of which can allow remote attackers to cause a Denial of Service condition. Versions less than 4.4.2-r1 are affected.
2502e45c47e6b01b6b3a981d284f6ec59e302110b8448a83b082f2cce67992e2
Gentoo Linux Security Advisory 201504-3 - Multiple vulnerabilities have been found in Apache HTTP Server, the worst of which could lead to arbitrary code execution. Versions less than 2.2.29 are affected.
93bdb4060115f5f696951b76a71bbae405be0ae58b613775011d6f63d2a80a0c
Debian Linux Security Advisory 3223-1 - Multiple vulnerabilities were discovered in ntp, an implementation of the Network Time Protocol.
d6818009c8ec76ed8bf8c5543cdfdc006d01ffed59e64eb9bea66320eceeec9f
Gentoo Linux Security Advisory 201504-2 - A vulnerability in sudo could allow a local attacker to read arbitrary files or bypass security restrictions. Versions less than 1.8.12 are affected.
3c953c3c2c696c6d8d88e9c6b1ce9d63a9520cc894b31f48e30a40317abf5a6c
Debian Linux Security Advisory 3222-1 - Miroslav Lichvar of Red Hat discovered multiple vulnerabilities in chrony, an alternative NTP client and server.
4322d7113061b959d9091b6bf8f6bac42fe6ec571c0c5ae8e3403642e50ba4f9
Debian Linux Security Advisory 3221-1 - Adam Sampson discovered a buffer overflow in the handling of the XAUTHORITY environment variable in das-watchdog, a watchdog daemon to ensure a realtime process won't hang the machine. A local user can exploit this flaw to escalate his privileges and execute arbitrary code as root.
97437faf0c85ea7147b497e0af76a2ede6e124558f969648c04e31c63dce6b66
Debian Linux Security Advisory 3220-1 - Hanno Boeck discovered a stack-based buffer overflow in the asn1_der_decoding function in Libtasn1, a library to manage ASN.1 structures. A remote attacker could take advantage of this flaw to cause an application using the Libtasn1 library to crash, or potentially to execute arbitrary code.
104a7ca770c2f094e24b977f62889248aae1654afbd89d28a167301c466b922d
Debian Linux Security Advisory 3219-1 - Stefan Roas discovered a way to cause a buffer overflow in DBD-FireBird, a Perl DBI driver for the Firebird RDBMS, in certain error conditions, due to the use of the sprintf() function to write to a fixed-size memory buffer.
962a23460df4764f5e4c10d5c95afce84b71e7a695fc0b972c3d9dddde456adb
Mandriva Linux Security Advisory 2015-203 - Nicolas Gregoire and Kevin Schaller discovered that Batik would load XML external entities by default. If a user or automated system were tricked into opening a specially crafted SVG file, an attacker could possibly obtain access to arbitrary files or cause resource consumption.
5eda7626171582440bef2089c8e9705f885b66c61b26757776ce0f17cd019bcc
HP Security Bulletin HPSBGN03316 1 - A potential security vulnerability has been discovered with the HP Support Solution Framework used from HP support web pages to identify products, find solutions and help with HP update downloads. The vulnerability could be exploited to allow an unauthorized download of software on the customer machine. Revision 1 of this advisory.
d0efdc907f070564b54ce251a6a0d35b35d353f3959b38c41b32345a2cb552b0
Debian Linux Security Advisory 3218-1 - Ignacio R. Morelle discovered that missing path restrictions in the "Battle of Wesnoth" game could result in the disclosure of arbitrary files in the user's home directory if malicious campaigns/maps are loaded.
140e64abb34a605410b4cef6a359f128dcc7d59ea6ea1eb2f1e73cf486ad7422
Red Hat Security Advisory 2015-0800-01 - OpenSSL is a toolkit that implements the Secure Sockets Layer and Transport Layer Security protocols, as well as a full-strength, general purpose cryptography library. It was discovered that OpenSSL would accept ephemeral RSA keys when using non-export RSA cipher suites. A malicious server could make a TLS/SSL client using OpenSSL use a weaker key exchange method. An integer underflow flaw, leading to a buffer overflow, was found in the way OpenSSL decoded malformed Base64-encoded inputs. An attacker able to make an application using OpenSSL decode a specially crafted Base64-encoded input could use this flaw to cause the application to crash. Note: this flaw is not exploitable via the TLS/SSL protocol because the data being transferred is not Base64-encoded.
abbf09a727e0b83fa2d8bb5abe0bc72734ac402485fe931677a7e0f75299642a
Mandriva Linux Security Advisory 2015-201 - Jakub Wilk discovered that arj follows symlinks created during unpacking of an arj archive. A remote attacker could use this flaw to perform a directory traversal attack if a user or automated system were tricked into processing a specially crafted arj archive. Jakub Wilk discovered that arj does not sufficiently protect from directory traversal while unpacking an arj archive containing file paths with multiple leading slashes. A remote attacker could use this flaw to write to arbitrary files if a user or automated system were tricked into processing a specially crafted arj archive. Jakub Wilk and Guillem Jover discovered a buffer overflow vulnerability in arj. A remote attacker could use this flaw to cause an application crash or, possibly, execute arbitrary code with the privileges of the user running arj. The updated packages provides a solution for these security issues.
53b2ec6d424cbe2e660af98dc2c29cd31a7612a9dff952a2ead56882ca345cde
Mandriva Linux Security Advisory 2015-202 - The symmetric-key feature in the receive function in ntp_proto.c in ntpd in NTP before 4.2.8p2 requires a correct MAC only if the MAC field has a nonzero length, which makes it easier for man-in-the-middle attackers to spoof packets by omitting the MAC. The symmetric-key feature in the receive function in ntp_proto.c in ntpd in NTP before 4.2.8p2 performs state-variable updates upon receiving certain invalid packets, which makes it easier for man-in-the-middle attackers to cause a denial of service by spoofing the source IP address of a peer. The updated packages provides a solution for these security issues.
39d7e9d9c815116af8efb6b2b36884a1c2b1f7b8ca467d0e4c5f247ed4954f77
Mandriva Linux Security Advisory 2015-200 - In MediaWiki before 1.23.9, one could circumvent the SVG MIME blacklist for embedded resources. This allowed an attacker to embed JavaScript in the SVG. In MediaWiki before 1.23.9, the SVG filter to prevent injecting JavaScript using animate elements was incorrect. In MediaWiki before 1.23.9, a stored XSS vulnerability exists due to the way attributes were expanded in MediaWiki's Html class, in combination with LanguageConverter substitutions. In MediaWiki before 1.23.9, MediaWiki's SVG filtering could be bypassed with entity encoding under the Zend interpreter. This could be used to inject JavaScript. In MediaWiki before 1.23.9, one could bypass the style filtering for SVG files to load external resources. This could violate the anonymity of users viewing the SVG. In MediaWiki before 1.23.9, MediaWiki versions using PBKDF2 for password hashing are vulnerable to DoS attacks using extremely long passwords. In MediaWiki before 1.23.9, MediaWiki is vulnerable to Quadratic Blowup DoS attacks, under both HHVM and Zend PHP. In MediaWiki before 1.23.9, the MediaWiki feature allowing a user to preview another user's custom JavaScript could be abused for privilege escalation. In MediaWiki before 1.23.9, function names were not sanitized in Lua error backtraces, which could lead to XSS. In MediaWiki before 1.23.9, the CheckUser extension did not prevent CSRF attacks on the form allowing checkusers to look up sensitive information about other users. Since the use of CheckUser is logged, the CSRF could be abused to defame a trusted user or flood the logs with noise. The mediawiki package has been updated to version 1.23.9, fixing these issues and other bugs.
c05a9bf44b7022507d18ce0ec9c0141893f532647d6ceb31d6d5e71882e345bf
Mandriva Linux Security Advisory 2015-199 - Updated less package fixes security vulnerability. Malformed UTF-8 data could have caused an out of bounds read in the UTF-8 decoding routines, causing an invalid read access.
2a187c6685af2436cb3054b4b15f7e9f8b99e8cbef4abc1d7bcfece2cf4a7f69