+----------------------------------------------------------------------+ | LinuxSecurity.com Weekly Newsletter | | June 26th, 2009 Volume 10, Number 26 | | | | Editorial Team: Dave Wreski <dwreski@xxxxxxxxxxxxxxxxx> | | Benjamin D. Thomas <bthomas@xxxxxxxxxxxxxxxxx> | +----------------------------------------------------------------------+ Thank you for reading the LinuxSecurity.com weekly security newsletter. The purpose of this document is to provide our readers with a quick summary of each week's most relevant Linux security headlines. This week, advisories were released for mahara, amule, xulrunner, vlc, apr-util, kernel, rt3, git, openssl, pcsc-lite, libpng, moin, libpng, gain, libtorrent, kde4, tomcat, java, ruby, logcheck, rpm, kdegraphics, thunderbird, icu, gstreamer, cyrus, seamonkey, and php. The distributors include Debian, Fedora, Mandriva, Red Hat, Slackware, Ubuntu, and Pardus. --- >> Linux+DVD Magazine << In each issue you can find information concerning the best use of Linux: safety, databases, multimedia, scientific tools, entertainment, programming, e-mail, news and desktop environments. Catch up with what professional network and database administrators, system programmers, webmasters and all those who believe in the power of Open Source software are doing! http://www.linuxsecurity.com/ads/adclick.php?bannerid=26 --- Review: Googling Security: How Much Does Google Know About You -------------------------------------------------------------- If I ask "How much do you know about Google?" You may not take even a second to respond. But if I may ask "How much does Google know about you"? You may instantly reply "Wait... what!? Do they!?" The book "Googling Security: How Much Does Google Know About You" by Greg Conti (Computer Science Professor at West Point) is the first book to reveal how Google's vast information stockpiles could be used against you or your business and what you can do to protect yourself. http://www.linuxsecurity.com/content/view/145939 --- A Secure Nagios Server ---------------------- Nagios is a monitoring software designed to let you know about problems on your hosts and networks quickly. You can configure it to be used on any network. Setting up a Nagios server on any Linux distribution is a very quick process however to make it a secure setup it takes some work. This article will not show you how to install Nagios since there are tons of them out there but it will show you in detail ways to improve your Nagios security. http://www.linuxsecurity.com/content/view/144088 --> Take advantage of the LinuxSecurity.com Quick Reference Card! <-- --> http://www.linuxsecurity.com/docs/QuickRefCard.pdf <-- ------------------------------------------------------------------------ * EnGarde Secure Community 3.0.22 Now Available! (Dec 9) ------------------------------------------------------ Guardian Digital is happy to announce the release of EnGarde Secure Community 3.0.22 (Version 3.0, Release 22). This release includes many updated packages and bug fixes and some feature enhancements to the EnGarde Secure Linux Installer and the SELinux policy. http://www.linuxsecurity.com/content/view/145668 ------------------------------------------------------------------------ * Debian: New mahara packages fix cross-site scripting (Jun 23) ------------------------------------------------------------- http://www.linuxsecurity.com/content/view/149203 * Debian: New amule packages fix insufficient input sanitising (Jun 22) --------------------------------------------------------------------- http://www.linuxsecurity.com/content/view/149197 * Debian: New xulrunner packages fix several vulnerabilities (Jun 18) ------------------------------------------------------------------- http://www.linuxsecurity.com/content/view/149177 * Debian: New vlc packages fix several vulnerabilities (Jun 18) ------------------------------------------------------------- http://www.linuxsecurity.com/content/view/149176 ------------------------------------------------------------------------ * Fedora 10 Update: apr-util-1.3.7-1.fc10 (Jun 24) ------------------------------------------------ Update to upstream version 1.3.7, see: http://svn.apache.org/repos/asf/apr /apr-util/tags/1.3.7/CHANGES Security fixes: - CVE-2009-0023 Fix underflow in apr_strmatch_precompile. - CVE-2009-1955 Fix a denial of service attack against the apr_xml_* interface using the "billion laughs" entity expansion technique. - CVE-2009-1956 Fix off by one overflow in apr_brigade_vprintf. Note: CVE-2009-1956 is only an issue on big-endian architectures. http://www.linuxsecurity.com/content/view/149223 * Fedora 11 Update: apr-util-1.3.7-1.fc11 (Jun 24) ------------------------------------------------ Update to upstream version 1.3.7, see: http://svn.apache.org/repos/asf/apr /apr-util/tags/1.3.7/CHANGES Security fixes: - CVE-2009-0023 Fix underflow in apr_strmatch_precompile. - CVE-2009-1955 Fix a denial of service attack against the apr_xml_* interface using the "billion laughs" entity expansion technique. - CVE-2009-1956 Fix off by one overflow in apr_brigade_vprintf. Note: CVE-2009-1956 is only an issue on big-endian architectures. http://www.linuxsecurity.com/content/view/149222 * Fedora 9 Update: kernel-2.6.27.25-78.2.56.fc9 (Jun 24) ------------------------------------------------------ Update to linux kernel 2.6.27.25: http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.27.25 http://www.linuxsecurity.com/content/view/149221 * Fedora 11 Update: rt3-3.8.2-8.fc11 (Jun 24) ------------------------------------------- http://www.linuxsecurity.com/content/view/149219 * Fedora 9 Update: apr-util-1.2.12-7.fc9 (Jun 24) ----------------------------------------------- Backport security fixes from upstream version 1.3.7: - CVE-2009-0023 Fix underflow in apr_strmatch_precompile. - CVE-2009-1955 Fix a denial of service attack against the apr_xml_* interface using the "billion laughs" entity expansion technique. - CVE-2009-1956 Fix off by one overflow in apr_brigade_vprintf. Note: CVE-2009-1956 is only an issue on big-endian architectures. http://www.linuxsecurity.com/content/view/149220 * Fedora 10 Update: rt3-3.8.2-8.fc10 (Jun 24) ------------------------------------------- http://www.linuxsecurity.com/content/view/149218 * Fedora 10 Update: git-1.6.0.6-4.fc10 (Jun 24) --------------------------------------------- This update fixes a Denial of Service vulnerability in git-daemon. It also fixes minor issues when using git-cvsimport and the formatting of the git-daemon xinetd service description. http://www.linuxsecurity.com/content/view/149217 * Fedora 11 Update: kernel-2.6.29.5-191.fc11 (Jun 24) --------------------------------------------------- Update to kernel 2.6.29.5: http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.29.5 Includes DRM modesetting bug fixes. Adds driver for VIA SD/MMC controllers and full support for the Nano processor in 64-bit mode. http://www.linuxsecurity.com/content/view/149216 * Fedora 11 Update: git-1.6.2.5-1.fc11 (Jun 24) --------------------------------------------- This update fixes a Denial of Service vulnerability in git-daemon. http://www.linuxsecurity.com/content/view/149215 * Fedora 9 Update: git-1.6.0.6-4.fc9 (Jun 24) ------------------------------------------- This update fixes a Denial of Service vulnerability in git-daemon. It also fixes minor issues when using git-cvsimport and the formatting of the git-daemon xinetd service description. http://www.linuxsecurity.com/content/view/149213 * Fedora 10 Update: kernel-2.6.27.25-170.2.72.fc10 (Jun 24) --------------------------------------------------------- Update to linux kernel 2.6.27.25: http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.27.25 http://www.linuxsecurity.com/content/view/149214 * Fedora 11 Update: openssl-0.9.8k-5.fc11 (Jun 19) ------------------------------------------------ Security update fixing DoS bugs in DTLS code. CVE-2009-1377 CVE-2009-1378 CVE-2009-1379 http://www.linuxsecurity.com/content/view/149186 * Fedora 9 Update: openssl-0.9.8g-9.14.fc9 (Jun 19) ------------------------------------------------- Security update fixing DoS bugs in DTLS code. CVE-2009-1377 CVE-2009-1378 CVE-2009-1379 http://www.linuxsecurity.com/content/view/149185 * Fedora 10 Update: openssl-0.9.8g-14.fc10 (Jun 19) ------------------------------------------------- Security update fixing DoS bugs in DTLS code. CVE-2009-1377 CVE-2009-1378 CVE-2009-1379 http://www.linuxsecurity.com/content/view/149184 * Fedora 11 Update: pcsc-lite-1.5.2-2.fc11 (Jun 19) ------------------------------------------------- Correct directory with world writeable permissions but no sticky bit set. http://www.linuxsecurity.com/content/view/149183 * Fedora 9 Update: libpng-1.2.37-1.fc9 (Jun 18) --------------------------------------------- Update to libpng 1.2.37, to fix CVE-2009-2042. This is a pretty low-risk issue, but it's been classified as a security issue... http://www.linuxsecurity.com/content/view/149172 * Fedora 11 Update: moin-1.8.4-1.fc11 (Jun 18) -------------------------------------------- This package updates Moin to 1.8.4, http://moinmo.in/MoinMoinRelease1.8 has a list of changes. This package includes a security fix for a hierarchical ACL vulnerability (hierarchical is not the default ACL mode), http://moinmo.in/SecurityFixes has the details of the fix. http://www.linuxsecurity.com/content/view/149171 * Fedora 9 Update: moin-1.6.4-2.fc9 (Jun 18) ------------------------------------------ This update includes a security fix for a hierarchical ACL vulnerability (hierarchical is not the default ACL mode), http://moinmo.in/SecurityFixes has the details of the fix. http://www.linuxsecurity.com/content/view/149170 * Fedora 10 Update: moin-1.6.4-2.fc10 (Jun 18) -------------------------------------------- This update includes a security fix for a hierarchical ACL vulnerability (hierarchical is not the default ACL mode), http://moinmo.in/SecurityFixes has the details of the fix. http://www.linuxsecurity.com/content/view/149169 * Fedora 10 Update: libpng-1.2.37-1.fc10 (Jun 18) ----------------------------------------------- Update to libpng 1.2.37, to fix CVE-2009-2042. This is a pretty low-risk issue, but it's been classified as a security issue... http://www.linuxsecurity.com/content/view/149168 * Fedora 10 Update: giflib-4.1.6-2.fc10 (Jun 18) ---------------------------------------------- - Update to 4.1.6 containing several upstream fixes etc. - Solved multilib problems with documentation (#465208, #474538) - Removed static library from giflib-devel package (#225796 #c1) http://www.linuxsecurity.com/content/view/149167 * Fedora 11 Update: libpng-1.2.37-1.fc11 (Jun 18) ----------------------------------------------- Update to libpng 1.2.37, to fix CVE-2009-2042. This is a pretty low-risk issue, but it's been classified as a security issue... http://www.linuxsecurity.com/content/view/149166 ------------------------------------------------------------------------ * Mandriva: Subject: [Security Announce] [ MDVSA-2009:140 ] gaim (Jun 25) ----------------------------------------------------------------------- Multiple security vulnerabilities has been identified and fixed in gaim: Buffer overflow in the XMPP SOCKS5 bytestream server in Pidgin before 2.5.6 allows remote authenticated users to execute arbitrary code via vectors involving an outbound XMPP file transfer. NOTE: some of these details are obtained from third party information (CVE-2009-1373). Multiple integer overflows in the msn_slplink_process_msg functions in the MSN protocol handler in (1) libpurple/protocols/msn/slplink.c and (2) libpurple/protocols/msnp9/slplink.c in Pidgin before 2.5.6 on 32-bit platforms allow remote attackers to execute arbitrary code via a malformed SLP message with a crafted offset value, leading to buffer overflows. NOTE: this issue exists because of an incomplete fix for CVE-2008-2927 (CVE-2009-1376). The updated packages have been patched to prevent this. http://www.linuxsecurity.com/content/view/149234 * Mandriva: Subject: [Security Announce] [ MDVSA-2009:140 ] gaim (Jun 25) ----------------------------------------------------------------------- Multiple security vulnerabilities has been identified and fixed in gaim: Buffer overflow in the XMPP SOCKS5 bytestream server in Pidgin before 2.5.6 allows remote authenticated users to execute arbitrary code via vectors involving an outbound XMPP file transfer. NOTE: some of these details are obtained from third party information (CVE-2009-1373). Multiple integer overflows in the msn_slplink_process_msg functions in the MSN protocol handler in (1) libpurple/protocols/msn/slplink.c and (2) libpurple/protocols/msnp9/slplink.c in Pidgin before 2.5.6 on 32-bit platforms allow remote attackers to execute arbitrary code via a malformed SLP message with a crafted offset value, leading to buffer overflows. NOTE: this issue exists because of an incomplete fix for CVE-2008-2927 (CVE-2009-1376). The updated packages have been patched to prevent this. http://www.linuxsecurity.com/content/view/149235 * Mandriva: Subject: [Security Announce] [ MDVSA-2009:140 ] gaim (Jun 25) ----------------------------------------------------------------------- Multiple security vulnerabilities has been identified and fixed in gaim: Buffer overflow in the XMPP SOCKS5 bytestream server in Pidgin before 2.5.6 allows remote authenticated users to execute arbitrary code via vectors involving an outbound XMPP file transfer. NOTE: some of these details are obtained from third party information (CVE-2009-1373). Multiple integer overflows in the msn_slplink_process_msg functions in the MSN protocol handler in (1) libpurple/protocols/msn/slplink.c and (2) libpurple/protocols/msnp9/slplink.c in Pidgin before 2.5.6 on 32-bit platforms allow remote attackers to execute arbitrary code via a malformed SLP message with a crafted offset value, leading to buffer overflows. NOTE: this issue exists because of an incomplete fix for CVE-2008-2927 (CVE-2009-1376). The updated packages have been patched to prevent this. http://www.linuxsecurity.com/content/view/149233 * Mandriva: Subject: [Security Announce] [ MDVSA-2009:139 ] libtorrent-rasterbar (Jun 24) --------------------------------------------------------------------------------------- A security vulnerability has been identified and corrected in libtorrent-rasterbar: Directory traversal vulnerability in src/torrent_info.cpp in Rasterbar libtorrent before 0.14.4, as used in firetorrent, qBittorrent, deluge Torrent, and other applications, allows remote attackers to create or overwrite arbitrary files via a .. (dot dot) and partial relative pathname in a Multiple File Mode list element in a .torrent file (CVE-2009-1760). The updated packages have been patched to prevent this. http://www.linuxsecurity.com/content/view/149210 * Mandriva: Subject: [Security Announce] [ MDVA-2009:118 ] kde4 (Jun 23) ---------------------------------------------------------------------- Mandriva Linux 2009 was released with KDE4 version 4.1. This update upgrades KDE4 in Mandriva Linux 2009 to version 4.2, which brings many bugfixes and overall improvements. http://www.linuxsecurity.com/content/view/149202 * Mandriva: Subject: [Security Announce] [ MDVSA-2009:138 ] tomcat5 (Jun 22) -------------------------------------------------------------------------- Multiple security vulnerabilities has been identified and fixed in tomcat5: Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, 6.0.0 through 6.0.18, and possibly earlier versions normalizes the target pathname before filtering the query string when using the RequestDispatcher method, which allows remote attackers to bypass intended access restrictions and conduct directory traversal attacks via .. (dot dot) sequences and the WEB-INF directory in a Request (CVE-2008-5515). Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when the Java AJP connector and mod_jk load balancing are used, allows remote attackers to cause a denial of service (application outage) via a crafted request with invalid headers, related to temporary blocking of connectors that have encountered errors, as demonstrated by an error involving a malformed HTTP Host header (CVE-2009-0033). Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when FORM authentication is used, allows remote attackers to enumerate valid usernames via requests to /j_security_check with malformed URL encoding of passwords, related to improper error checking in the (1) MemoryRealm, (2) DataSourceRealm, and (3) JDBCRealm authentication realms, as demonstrated by a % (percent) value for the j_password parameter (CVE-2009-0580). The calendar application in the examples web application contains an XSS flaw due to invalid HTML which renders the XSS filtering protection ineffective (CVE-2009-0781). Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18 permits web applications to replace an XML parser used for other web applications, which allows local users to read or modify the (1) web.xml, (2) context.xml, or (3) tld files of arbitrary web applications via a crafted application that is loaded earlier than the target application (CVE-2009-0783). The updated packages have been patched to prevent this. Additionally Apache Tomcat has been upgraded to the latest 5.5.27 version for 2009.0. http://www.linuxsecurity.com/content/view/149201 * Mandriva: Subject: [Security Announce] [ MDVSA-2009:138 ] tomcat5 (Jun 22) -------------------------------------------------------------------------- Multiple security vulnerabilities has been identified and fixed in tomcat5: Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, 6.0.0 through 6.0.18, and possibly earlier versions normalizes the target pathname before filtering the query string when using the RequestDispatcher method, which allows remote attackers to bypass intended access restrictions and conduct directory traversal attacks via .. (dot dot) sequences and the WEB-INF directory in a Request (CVE-2008-5515). Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when the Java AJP connector and mod_jk load balancing are used, allows remote attackers to cause a denial of service (application outage) via a crafted request with invalid headers, related to temporary blocking of connectors that have encountered errors, as demonstrated by an error involving a malformed HTTP Host header (CVE-2009-0033). Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when FORM authentication is used, allows remote attackers to enumerate valid usernames via requests to /j_security_check with malformed URL encoding of passwords, related to improper error checking in the (1) MemoryRealm, (2) DataSourceRealm, and (3) JDBCRealm authentication realms, as demonstrated by a % (percent) value for the j_password parameter (CVE-2009-0580). The calendar application in the examples web application contains an XSS flaw due to invalid HTML which renders the XSS filtering protection ineffective (CVE-2009-0781). Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18 permits web applications to replace an XML parser used for other web applications, which allows local users to read or modify the (1) web.xml, (2) context.xml, or (3) tld files of arbitrary web applications via a crafted application that is loaded earlier than the target application (CVE-2009-0783). The updated packages have been patched to prevent this. Additionally Apache Tomcat has been upgraded to the latest 5.5.27 version for 2009.0. http://www.linuxsecurity.com/content/view/149200 * Mandriva: Subject: [Security Announce] [ MDVSA-2009:138 ] tomcat5 (Jun 22) -------------------------------------------------------------------------- Multiple security vulnerabilities has been identified and fixed in tomcat5: Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, 6.0.0 through 6.0.18, and possibly earlier versions normalizes the target pathname before filtering the query string when using the RequestDispatcher method, which allows remote attackers to bypass intended access restrictions and conduct directory traversal attacks via .. (dot dot) sequences and the WEB-INF directory in a Request (CVE-2008-5515). Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when the Java AJP connector and mod_jk load balancing are used, allows remote attackers to cause a denial of service (application outage) via a crafted request with invalid headers, related to temporary blocking of connectors that have encountered errors, as demonstrated by an error involving a malformed HTTP Host header (CVE-2009-0033). Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when FORM authentication is used, allows remote attackers to enumerate valid usernames via requests to /j_security_check with malformed URL encoding of passwords, related to improper error checking in the (1) MemoryRealm, (2) DataSourceRealm, and (3) JDBCRealm authentication realms, as demonstrated by a % (percent) value for the j_password parameter (CVE-2009-0580). The calendar application in the examples web application contains an XSS flaw due to invalid HTML which renders the XSS filtering protection ineffective (CVE-2009-0781). Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18 permits web applications to replace an XML parser used for other web applications, which allows local users to read or modify the (1) web.xml, (2) context.xml, or (3) tld files of arbitrary web applications via a crafted application that is loaded earlier than the target application (CVE-2009-0783). The updated packages have been patched to prevent this. Additionally Apache Tomcat has been upgraded to the latest 5.5.27 version for 2009.0. http://www.linuxsecurity.com/content/view/149199 * Mandriva: Subject: [Security Announce] [ MDVSA-2009:136 ] tomcat5 (Jun 22) -------------------------------------------------------------------------- Multiple security vulnerabilities has been identified and fixed in tomcat5: Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, 6.0.0 through 6.0.18, and possibly earlier versions normalizes the target pathname before filtering the query string when using the RequestDispatcher method, which allows remote attackers to bypass intended access restrictions and conduct directory traversal attacks via .. (dot dot) sequences and the WEB-INF directory in a Request (CVE-2008-5515). Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when the Java AJP connector and mod_jk load balancing are used, allows remote attackers to cause a denial of service (application outage) via a crafted request with invalid headers, related to temporary blocking of connectors that have encountered errors, as demonstrated by an error involving a malformed HTTP Host header (CVE-2009-0033). Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when FORM authentication is used, allows remote attackers to enumerate valid usernames via requests to /j_security_check with malformed URL encoding of passwords, related to improper error checking in the (1) MemoryRealm, (2) DataSourceRealm, and (3) JDBCRealm authentication realms, as demonstrated by a % (percent) value for the j_password parameter (CVE-2009-0580). The calendar application in the examples web application contains an XSS flaw due to invalid HTML which renders the XSS filtering protection ineffective (CVE-2009-0781). Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18 permits web applications to replace an XML parser used for other web applications, which allows local users to read or modify the (1) web.xml, (2) context.xml, or (3) tld files of arbitrary web applications via a crafted application that is loaded earlier than the target application (CVE-2009-0783). The updated packages have been patched to prevent this. Additionally Apache Tomcat has been upgraded to the latest 5.5.27 version for 2009.0. http://www.linuxsecurity.com/content/view/149198 * Mandriva: Subject: [Security Announce] [ MDVSA-2009:137 ] java-1.6.0-openjdk (Jun 19) ------------------------------------------------------------------------------------- Multiple security vulnerabilities has been identified and fixed in Little cms library embedded in OpenJDK: A memory leak flaw allows remote attackers to cause a denial of service (memory consumption and application crash) via a crafted image file (CVE-2009-0581). Multiple integer overflows allow remote attackers to execute arbitrary code via a crafted image file that triggers a heap-based buffer overflow (CVE-2009-0723). Multiple stack-based buffer overflows allow remote attackers to execute arbitrary code via a crafted image file associated with a large integer value for the (1) input or (2) output channel (CVE-2009-0733). A flaw in the transformations of monochrome profiles allows remote attackers to cause denial of service triggered by a NULL pointer dereference via a crafted image file (CVE-2009-0793). Further security fixes in the JRE and in the Java API of OpenJDK: A flaw in handling temporary font files by the Java Virtual Machine (JVM) allows remote attackers to cause denial of service (CVE-2006-2426). An integer overflow flaw was found in Pulse-Java when handling Pulse audio source data lines. An attacker could use this flaw to cause an applet to crash, leading to a denial of service (CVE-2009-0794). A flaw in Java Runtime Environment initialized LDAP connections allows authenticated remote users to cause denial of service on the LDAP service (CVE-2009-1093). A flaw in the Java Runtime Environment LDAP client in handling server LDAP responses allows remote attackers to execute arbitrary code on the client side via malicious server response (CVE-2009-1094). Buffer overflows in the the Java Runtime Environment unpack200 utility allow remote attackers to execute arbitrary code via an crafted applet (CVE-2009-1095, CVE-2009-1096). A buffer overflow in the splash screen processing allows a attackers to execute arbitrary code (CVE-2009-1097). A buffer overflow in GIF images handling allows remote attackers to execute arbitrary code via an crafted GIF image (CVE-2009-1098). A flaw in the Java API for XML Web Services (JAX-WS) service endpoint handling allows remote attackers to cause a denial of service on the service endpoint's server side (CVE-2009-1101). A flaw in the Java Runtime Environment Virtual Machine code generation allows remote attackers to execute arbitrary code via a crafted applet (CVE-2009-1102). This update provides fixes for these issues. Update: java-1.6.0-openjdk requires rhino packages and these has been further updated. http://www.linuxsecurity.com/content/view/149188 * Mandriva: Subject: [Security Announce] [ MDVA-2009:117 ] ruby-RubyGems (Jun 18) ------------------------------------------------------------------------------- On x86_64, rubygems assumes that the gem installation path is in /usr/lib64/ruby. This is problematic because all of the Mandriva ruby-* packages install their rb files under /usr/lib/ruby regardless of the machine architecture; rubygems consequently cannot find any of the installed gems. This update fixes this issue. http://www.linuxsecurity.com/content/view/149179 * Mandriva: Subject: [Security Announce] [ MDVA-2009:116 ] glibc (Jun 18) ----------------------------------------------------------------------- New glibc release to fix some issues found in glibc 2.8 present in Mandriva 2009.0: - ulimit(UL_SETFSIZE) does not return the integer part of the new file size limit divided by 512 (http://linuxtesting.org/results/report?num=S0167, Mandriva bug #51685) - When including pthread.h and using pthread_cleanup_pop or pthread_cleanup_pop_restore_np macros, a compiler warning is issued or build error happens if -Werror is used (http://sourceware.org/bugzilla/show_bug.cgi?id=7056, Mandriva bug #49142) http://www.linuxsecurity.com/content/view/149178 * Mandriva: Subject: [Security Announce] [ MDVA-2009:115 ] webkit (Jun 18) ------------------------------------------------------------------------ Webkit shipped in 2009.1 has a bug that closes The Gimp help-browser plugin, this update fixes this issue. http://www.linuxsecurity.com/content/view/149175 * Mandriva: Subject: [Security Announce] [ MDVA-2009:114 ] logcheck (Jun 18) -------------------------------------------------------------------------- The logcheck package shipped in mandriva 2009.1 had two issues, preventing it to run properly: - its configuration directory (/etc/logcheck) is not readable with the identity used for running logcheck - it uses run-parts utility with unsupported --list option http://www.linuxsecurity.com/content/view/149174 * Mandriva: Subject: [Security Announce] [ MDVA-2009:113 ] rpm (Jun 18) --------------------------------------------------------------------- This update fixes a minor issue with rpm: - mdvsys mass-update can segfault when parsing the %apply_patches macros through librpm (bug #50579) http://www.linuxsecurity.com/content/view/149173 ------------------------------------------------------------------------ * RedHat: Critical: kdelibs security update (Jun 25) -------------------------------------------------- Updated kdelibs packages that fix multiple security issues are now available for Red Hat Enterprise Linux 4 and 5. This update has been rated as having critical security impact by the Red Hat Security Response Team. http://www.linuxsecurity.com/content/view/149236 * RedHat: Important: kdelibs security update (Jun 25) --------------------------------------------------- Updated kdelibs packages that fix one security issue are now available for Red Hat Enterprise Linux 3. This update has been rated as having important security impact by the Red Hat Security Response Team. http://www.linuxsecurity.com/content/view/149237 * RedHat: Critical: kdegraphics security update (Jun 25) ------------------------------------------------------ Updated kdegraphics packages that fix two security issues are now available for Red Hat Enterprise Linux 5. This update has been rated as having critical security impact by the Red Hat Security Response Team. http://www.linuxsecurity.com/content/view/149238 * RedHat: Moderate: net-snmp security update (Jun 25) --------------------------------------------------- Updated net-snmp packages that fix a security issue are now available for Red Hat Enterprise Linux 3. This update has been rated as having moderate security impact by the Red Hat Security Response Team. http://www.linuxsecurity.com/content/view/149230 * RedHat: Moderate: thunderbird security update (Jun 25) ------------------------------------------------------ An updated thunderbird package that fixes several security issues is now available for Red Hat Enterprise Linux 4. This update has been rated as having moderate security impact by the Red Hat Security Response Team. http://www.linuxsecurity.com/content/view/149231 * RedHat: Moderate: thunderbird security update (Jun 25) ------------------------------------------------------ An updated thunderbird package that fixes several security issues is now available for Red Hat Enterprise Linux 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. http://www.linuxsecurity.com/content/view/149232 * RedHat: Moderate: icu security update (Jun 25) ---------------------------------------------- Updated icu packages that fix a security issue are now available for Red Hat Enterprise Linux 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. http://www.linuxsecurity.com/content/view/149228 * RedHat: Moderate: gstreamer-plugins-good security update (Jun 25) ----------------------------------------------------------------- Updated gstreamer-plugins-good packages that fix multiple security issues are now available for Red Hat Enterprise Linux 5. This update has been rated as having moderate security impact by the Red Hat Security Response Team. http://www.linuxsecurity.com/content/view/149229 * RedHat: Important: cyrus-imapd security update (Jun 18) ------------------------------------------------------- Updated cyrus-imapd packages that fix a security issue are now available for Red Hat Enterprise Linux 4 and 5. This update has been rated as having important security impact by the Red Hat Security Response Team. http://www.linuxsecurity.com/content/view/149181 ------------------------------------------------------------------------ * Slackware: seamonkey (Jun 25) ------------------------------- New seamonkey packages are available for Slackware 11.0, 12.0, 12.1, 12.2, and -current to fix security issues. More details about the issues may be found on the Mozilla web site: http://www.mozilla.org/security/known-vulnerabilities/seamonkey11.htm l http://www.linuxsecurity.com/content/view/149225 * Slackware: libpng (Jun 19) ---------------------------- New libpng packages are available for Slackware 8.1, 9.0, 9.1, 10.0, 10.1, 10.2, 11.0, 12.0, 12.1, 12.2, and -current to fix a security issue. Jeff Phillips discovered an uninitialized-memory-read bug affecting interlaced images that may have security implications. More details about this issue may be found in the Common Vulnerabilities and Exposures (CVE) database: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-2042 http://www.linuxsecurity.com/content/view/149191 * Slackware: ruby (Jun 19) -------------------------- New ruby packages are available for Slackware 11.0, 12.0, 12.1, 12.2, and -current to fix a security issue. More details about this issue may be found in the Common Vulnerabilities and Exposures (CVE) database: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1904 http://www.linuxsecurity.com/content/view/149190 ------------------------------------------------------------------------ * Ubuntu: Moodle vulnerabilities (Jun 24) ---------------------------------------- Thor Larholm discovered that PHPMailer, as used by Moodle, did not correctly escape email addresses. A local attacker with direct access to the Moodle database could exploit this to execute arbitrary commands as the web server user. (CVE-2007-3215) Nigel McNie discovered that fetching https URLs did not correctly escape shell meta-characters. An authenticated remote attacker could execute arbitrary commands as the web server user, if curl was installed and configured. (CVE-2008-4796, MSA-09-0003) It was discovered that Smarty (also included in Moodle), did not correctly filter certain inputs. An authenticated remote attacker could exploit this to execute arbitrary PHP commands as the web server user. (CVE-2008-4810, CVE-2008-4811, CVE-2009-1669) It was discovered that the unused SpellChecker extension in Moodle did not correctly handle temporary files. If the tool had been locally modified, it could be made to overwrite arbitrary local files via symlinks. (CVE-2008-5153) Mike Churchward discovered that Moodle did not correctly filter Wiki page titles in certain areas. An authenticated remote attacker could exploit this to cause cross-site scripting (XSS), which could be used to modify or steal confidential data of other users within the same web domain. (CVE-2008-5432, MSA-08-0022) It was discovered that the HTML sanitizer, "Login as" feature, and logging in Moodle did not correctly handle certain inputs. An authenticated remote attacker could exploit this to generate XSS, which could be used to modify or steal confidential data of other users within the same web domain. (CVE-2008-5619, CVE-2009-0500, CVE-2009-0502, MSA-08-0026, MSA-09-0004, MSA-09-0007) It was discovered that the HotPot module in Moodle did not correctly filter SQL inputs. An authenticated remote attacker could execute arbitrary SQL commands as the moodle database user, leading to a loss of privacy or denial of service. (CVE-2008-6124, MSA-08-0010) Kevin Madura discovered that the forum actions and messaging settings in Moodle were not protected from cross-site request forgery (CSRF). If an authenticated user were tricked into visiting a malicious website while logged into Moodle, a remote attacker could change the user's configurations or forum content. (CVE-2009-0499, MSA-09-0008, MSA-08-0023) Daniel Cabezas discovered that Moodle would leak usernames from the Calendar Export tool. A remote attacker could gather a list of users, leading to a loss of privacy. (CVE-2009-0501, MSA-09-0006) Christian Eibl discovered that the TeX filter in Moodle allowed any function to be used. An authenticated remote attacker could post a specially crafted TeX formula to execute arbitrary TeX functions, potentially reading any file accessible to the web server user, leading to a loss of privacy. (CVE-2009-1171, MSA-09-0009) Johannes Kuhn discovered that Moodle did not correctly validate user permissions when attempting to switch user accounts. An authenticated remote attacker could switch to any other Moodle user, leading to a loss of privacy. (MSA-08-0003) Hanno Boeck discovered that unconfigured Moodle instances contained XSS vulnerabilities. An unauthenticated remote attacker could exploit this to modify or steal confidential data of other users within the same web domain. (MSA-08-0004) Debbie McDonald, Mauno Korpelainen, Howard Miller, and Juan Segarra Montesinos discovered that when users were deleted from Moodle, their profiles and avatars were still visible. An authenticated remote attacker could exploit this to store information in profiles even after they were removed, leading to spam traffic. (MSA-08-0015, MSA-09-0001, MSA-09-0002) Lars Vogdt discovered that Moodle did not correctly filter certain inputs. An authenticated remote attacker could exploit this to generate XSS from which they could modify or steal confidential data of other users within the same web domain. (MSA-08-0021) It was discovered that Moodle did not correctly filter inputs for group creation, mnet, essay question, HOST param, wiki param, and others. An authenticated remote attacker could exploit this to generate XSS from which they could modify or steal confidential data of other users within the same web domain. (MDL-9288, MDL-11759, MDL-12079, MDL-12793, MDL-14806) It was discovered that Moodle did not correctly filter SQL inputs when performing a restore. An attacker authenticated as a Moodle administrator could execute arbitrary SQL commands as the moodle database user, leading to a loss of privacy or denial of service. (MDL-11857) http://www.linuxsecurity.com/content/view/149224 * Ubuntu: GStreamer Good Plugins vulnerability (Jun 22) ------------------------------------------------------ Tielei Wang discovered that GStreamer Good Plugins did not correctly handle malformed PNG image files. If a user were tricked into opening a crafted PNG image file with a GStreamer application, an attacker could cause a denial of service via application crash, or possibly execute arbitrary code with the privileges of the user invoking the program. http://www.linuxsecurity.com/content/view/149193 ------------------------------------------------------------------------ * Pardus: Php: Denial of Service (Jun 25) --------------------------------------- exploited by malicious people to cause a DoS (Denial of Service). http://www.linuxsecurity.com/content/view/149227 * Pardus: Compress::Raw::Zlib: Denial of (Jun 25) ----------------------------------------------- Perl, which can be exploited by malicious people to cause a DoS (Denial of Service) or to potentially compromise an application using the module. http://www.linuxsecurity.com/content/view/149226 * Pardus: Firefox: Multiple Vulnerabilities (Jun 24) -------------------------------------------------- exploited by malicious people to disclose sensitive information, bypass certain security restrictions, or to compromise a vulnerable system. http://www.linuxsecurity.com/content/view/149209 * Pardus: Git: Denial of Service (Jun 24) --------------------------------------- malicious people to cause a DoS (Denial of Service). http://www.linuxsecurity.com/content/view/149207 * Pardus: Ruby: Denial of Service (Jun 24) ---------------------------------------- malicious people to cause a DoS (Denial of Service). http://www.linuxsecurity.com/content/view/149208 * Pardus: Imagemagick: Multiple (Jun 24) -------------------------------------- exploited by malicious people to potentially compromise a user's system. http://www.linuxsecurity.com/content/view/149205 * Pardus: Gst-plugins-good: Multiple Integer (Jun 24) --------------------------------------------------- can be exploited by malicious people to potentially compromise an application using the library. http://www.linuxsecurity.com/content/view/149206 ------------------------------------------------------------------------ Distributed by: Guardian Digital, Inc. LinuxSecurity.com To unsubscribe email vuln-newsletter-request@xxxxxxxxxxxxxxxxx with "unsubscribe" in the subject of the message. ------------------------------------------------------------------------