Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:31859
HistoryMar 23, 2015 - 12:00 a.m.

[ MDVSA-2015:051 ] sympa

2015-03-2300:00:00
vulners.com
10

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


Mandriva Linux Security Advisory MDVSA-2015:051
http://www.mandriva.com/en/support/security/


Package : sympa
Date : March 3, 2015
Affected: Business Server 1.0


Problem Description:

Updated sympa packages fix security vulnerability:

A vulnerability have been discovered in Sympa web interface that
allows access to files on the server filesystem. This breach allows
to send to a list or a user any file readable by the Sympa user,
located on the server filesystem, using the Sympa web interface
newsletter posting area (CVE-2015-1306).


References:

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-1306
http://advisories.mageia.org/MGASA-2015-0085.html


Updated Packages:

Mandriva Business Server 1/X86_64:
d8ffecf39d6d9e8e96bc56debaf0e70a mbs1/x86_64/sympa-6.1.17-1.1.mbs1.x86_64.rpm
2feeac6b4cfea47afbae2a1f3d4dcfc3 mbs1/x86_64/sympa-www-6.1.17-1.1.mbs1.x86_64.rpm
582266f67964cef0db6f42e144bcdf58 mbs1/SRPMS/sympa-6.1.17-1.1.mbs1.src.rpm


To upgrade automatically use MandrivaUpdate or urpmi. The verification
of md5 checksums and GPG signatures is performed automatically for you.

All packages are signed by Mandriva for security. You can obtain the
GPG public key of the Mandriva Security Team by executing:

gpg --recv-keys --keyserver pgp.mit.edu 0x22458A98

You can view other update advisories for Mandriva Linux at:

http://www.mandriva.com/en/support/security/advisories/

If you want to report vulnerabilities, please contact

security_(at)_mandriva.com


Type Bits/KeyID Date User ID
pub 1024D/22458A98 2000-07-10 Mandriva Security Team
<security*mandriva.com>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)

iD8DBQFU9VesmqjQ0CJFipgRAnfKAKCJPB7/+FuWn6unqvV/fZkkMkHATQCfXGd7
V/EfmuWRGKHQ4uUPclAaCcQ=
=zsP3
-----END PGP SIGNATURE-----