https://mandriva.com/security/advisories Mandriva security advisories en-us
https://mandriva.com/security/advisories?name=MDKSA-2006:038 The Trustix Secure Linux team discovered a vulnerability in the groffer<br /> utility, part of the groff package. It created a temporary directory<br /> in an insecure way which allowed for the exploitation of a race<br /> condition to create or overwrite files the privileges of the user<br /> invoking groffer.<br /> <br /> Likewise, similar temporary file issues were fixed in the pic2graph<br /> and eqn2graph programs which now use mktemp to create temporary<br /> files, as discovered by Javier Fernandez-Sanguino Pena.<br /> <br /> The updated packages have been patched to correct this issue.
https://mandriva.com/security/advisories?name=MDKSA-2006:037 Mozilla and Mozilla Firefox allow remote attackers to cause a denial of<br /> service (CPU consumption and delayed application startup) via a web<br /> site with a large title, which is recorded in history.dat but not<br /> processed efficiently during startup. (CVE-2005-4134)<br /> <br /> The Javascript interpreter (jsinterp.c) in Mozilla and Firefox before<br /> 1.5.1 does not properly dereference objects, which allows remote<br /> attackers to cause a denial of service (crash) or execute arbitrary<br /> code via unknown attack vectors related to garbage collection.<br /> (CVE-2006-0292)<br /> <br /> The XULDocument.persist function in Mozilla, Firefox before 1.5.0.1,<br /> and SeaMonkey before 1.0 does not validate the attribute name, which<br /> allows remote attackers to execute arbitrary Javascript by injecting<br /> RDF data into the user's localstore.rdf file. (CVE-2006-0296)<br /> <br /> Updated packages are patched to address these issues.
https://mandriva.com/security/advisories?name=MDKSA-2006:036 Mozilla and Mozilla Firefox allow remote attackers to cause a denial of<br /> service (CPU consumption and delayed application startup) via a web<br /> site with a large title, which is recorded in history.dat but not<br /> processed efficiently during startup. (CVE-2005-4134)<br /> <br /> The Javascript interpreter (jsinterp.c) in Mozilla and Firefox before<br /> 1.5.1 does not properly dereference objects, which allows remote<br /> attackers to cause a denial of service (crash) or execute arbitrary<br /> code via unknown attack vectors related to garbage collection.<br /> (CVE-2006-0292)<br /> <br /> The XULDocument.persist function in Mozilla, Firefox before 1.5.0.1,<br /> and SeaMonkey before 1.0 does not validate the attribute name, which<br /> allows remote attackers to execute arbitrary Javascript by injecting<br /> RDF data into the user's localstore.rdf file. (CVE-2006-0296)<br /> <br /> Updated packages are patched to address these issues.
https://mandriva.com/security/advisories?name=MDKSA-2006:035 A flaw in the PHP gd extension in versions prior to 4.4.1 could allow<br /> a remote attacker to bypass safe_mode and open_basedir restrictions via<br /> unknown attack vectors.<br /> <br /> The updated packages have been patched to correct this issue.
https://mandriva.com/security/advisories?name=MDKSA-2006:034 A flaw was discovered in the scp local-to-local copy implementation<br /> where filenames that contain shell metacharacters or spaces are<br /> expanded twice, which could lead to the execution of arbitrary<br /> commands if a local user could be tricked into a scp'ing a specially<br /> crafted filename.<br /> <br /> The provided updates bump the OpenSSH version to the latest release<br /> version of 4.3p1. A number of differences exist, primarily dealing<br /> with PAM authentication over the version included in Corporate 3.0<br /> and MNF2. In particular, the default sshd_config now only accepts<br /> protocol 2 connections and UsePAM is now disabled by default.<br /> <br /> On systems using alternate authentication methods (ie. LDAP) that use<br /> the PAM stack for authentication, you will need to enable UsePAM.<br /> Note that the default /etc/pam.d/sshd file has also been modified to<br /> use the pam_listfile.so module which will deny access to any users<br /> listed in /etc/ssh/denyusers (by default, this is only the root user).<br /> This is required to preserve the expected behaviour when using<br /> "PermitRootLogin without-password"; otherwise it would still be possible<br /> to obtain a login prompt and login without using keys.<br /> <br /> Mandriva Linux 10.1 and newer already have these changes in their<br /> shipped versions. There are new features in OpenSSH and users are<br /> encouraged to review the new sshd_config and ssh_config files when<br /> upgrading.
https://mandriva.com/security/advisories?name=MDKSA-2006:033 OpenOffice.org 2.0 and earlier, when hyperlinks has been disabled,<br /> does not prevent the user from clicking the WWW-browser button in the<br /> Hyperlink dialog, which makes it easier for attackers to trick the user<br /> into bypassing intended security settings.<br /> <br /> Updated packages are patched to address this issue.
https://mandriva.com/security/advisories?name=MDKSA-2006:032 Heap-based buffer overflow in Splash.cc in xpdf allows attackers to<br /> cause a denial of service and possibly execute arbitrary code via<br /> crafted splash images that produce certain values that exceed the width<br /> or height of the associated bitmap.<br /> <br /> The updated packages have been patched to correct this issue.
https://mandriva.com/security/advisories?name=MDKSA-2006:031 Heap-based buffer overflow in Splash.cc in xpdf allows attackers to<br /> cause a denial of service and possibly execute arbitrary code via<br /> crafted splash images that produce certain values that exceed the width<br /> or height of the associated bitmap.<br /> <br /> Kdegraphics-kpdf uses a copy of the xpdf code and as such has the same<br /> issues.<br /> <br /> The updated packages have been patched to correct this issue.
https://mandriva.com/security/advisories?name=MDKSA-2006:030 Heap-based buffer overflow in Splash.cc in xpdf allows attackers to<br /> cause a denial of service and possibly execute arbitrary code via<br /> crafted splash images that produce certain values that exceed the width<br /> or height of the associated bitmap.<br /> <br /> Poppler uses a copy of the xpdf code and as such has the same issues.<br /> <br /> The updated packages have been patched to correct this issue.
https://mandriva.com/security/advisories?name=MDKSA-2006:029 Buffer overflow in Library of Assorted Spiffy Things (LibAST) 0.6.1<br /> and earlier, as used in Eterm and possibly other software, allows<br /> local users to execute arbitrary code as the utmp user via a long -X<br /> argument.<br /> <br /> The updated packages have been patched to correct this issue.