Linux Advisory Watch: March 6th, 2010

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



+----------------------------------------------------------------------+
| LinuxSecurity.com                               Linux Advisory Watch |
| March 6th, 2010                                 Volume 11, Number 10 |
|                                                                      |
| Editorial Team:              Dave Wreski <dwreski@xxxxxxxxxxxxxxxxx> |
|                       Benjamin D. Thomas <bthomas@xxxxxxxxxxxxxxxxx> |
+----------------------------------------------------------------------+

Thank you for reading the Linux Advisory Watch Security Newsletter.
The purpose of this document is to provide our readers with a quick
summary of each week's vendor security bulletins and pointers on
methods to improve the security posture of your open source system.

Vulnerabilities affect nearly every vendor virtually every week, so
be sure to read through to find the updates your distributor have
made available.

Introduction: Buffer Overflow Vulnerabilities
---------------------------------------------
Buffer overflows are a leading type of security vulnerability. This
paper explains what a buffer overflow is, how it can be exploited, and
what countermeasures can be taken to prevent the use of buffer overflow
vulnerabilities.

http://www.linuxsecurity.com/content/view/118881


FTP Attack Case Study Part II: the Lessons
------------------------------------------
This article presents part II of a case study related to a company
network server compromise. Lessons on designing and implementing
security are drawn from the case.

http://www.linuxsecurity.com/content/view/117696

-->  Take advantage of the LinuxSecurity.com Quick Reference Card!  <--
-->  http://www.linuxsecurity.com/docs/QuickRefCard.pdf             <--

------------------------------------------------------------------------

* EnGarde Secure Community 3.0.22 Now Available! (Dec 9)
  ------------------------------------------------------
  Guardian Digital is happy to announce the release of EnGarde Secure
  Community 3.0.22 (Version 3.0, Release 22).  This release includes
  many updated packages and bug fixes and some feature enhancements to
  the EnGarde Secure Linux Installer and the SELinux policy.

  http://www.linuxsecurity.com/content/view/145668

------------------------------------------------------------------------

* Debian: 2006-1: sudo: Multiple vulnerabilities (Mar 2)
  ------------------------------------------------------
  Several vulnerabilities have been discovered in sudo, a program
  designed to allow a sysadmin to give limited root privileges to users
  database server. The Common Vulnerabilities and Exposures project
  identifies the [More...]

  http://www.linuxsecurity.com/content/view/151823

* Debian: 2004-1: linux-2.6.24: privilege escalation/denial of service (Feb 28)
  -----------------------------------------------------------------------------
  NOTE: This kernel update marks the final planned kernel security
  update for the 2.6.24 kernel in the Debian release 'etch'. Although
  security support for 'etch' officially ended on Feburary 15th, 2010,
  this update was already in preparation before that date. [More...]

  http://www.linuxsecurity.com/content/view/151794

* Debian: 2004-1: samba: Multiple vulnerabilities (Feb 28)
  --------------------------------------------------------
  Two local vulnerabilities have been discovered in samba, a SMB/CIFS
  file, print, and login server for Unix. The Common Vulnerabilities
  and Exposures project identifies the following problems: [More...]

  http://www.linuxsecurity.com/content/view/151793

------------------------------------------------------------------------

* Gentoo: 201003-01: sudo: Privilege escalation (Mar 3)
  -----------------------------------------------------
  Two vulnerabilities in sudo might allow local users to
  escalateprivileges and execute arbitrary code with root privileges.

  http://www.linuxsecurity.com/content/view/151830

------------------------------------------------------------------------

* Mandriva: 2010:055: poppler (Mar 5)
  -----------------------------------
  An out-of-bounds reading flaw in the JBIG2 decoder allows remote
  attackers to cause a denial of service (crash) via a crafted PDF file
  (CVE-2009-0799). Multiple input validation flaws in the JBIG2 decoder
  allows [More...]

  http://www.linuxsecurity.com/content/view/151843

* Mandriva: 2010:054: pam_krb5 (Mar 4)
  ------------------------------------
  Pam_krb5 2.2.14 through 2.3.4 generates different password prompts
  depending on whether the user account exists, which allows remote
  attackers to enumerate valid usernames (CVE-2009-1384). This update
  provides the version 2.3.5 of pam_krb5, which is not [More...]

  http://www.linuxsecurity.com/content/view/151835

* Mandriva: 2010:053: apache (Mar 2)
  ----------------------------------
  A vulnerabilitiy has been found and corrected in apache:
  mod_proxy_ajp: Respond with HTTP_BAD_REQUEST when the body is not
  sent after request headers indicate a request body is incoming; this
  is not a case of HTTP_INTERNAL_SERVER_ERROR (CVE-2010-0408).
  [More...]

  http://www.linuxsecurity.com/content/view/151822

* Mandriva: 2010:052: sudo (Mar 1)
  --------------------------------
  A vulnerabilitiy has been found and corrected in sudo: sudo 1.6.x
  before 1.6.9p21, when the runas_default option is used, does not
  properly set group memberships, which allows local users to gain
  privileges via a sudo command (CVE-2010-0427). [More...]

  http://www.linuxsecurity.com/content/view/151811

* Mandriva: 2010:051: mozilla-thunderbird (Mar 1)
  -----------------------------------------------
  A vulnerabilitiy has been found and corrected in mozilla-thunderbird:
  Security researcher Alin Rad Pop of Secunia Research reported that
  the HTML parser incorrectly freed used memory when insufficient space
  was available to process remaining input. Under such circumstances,
  [More...]

  http://www.linuxsecurity.com/content/view/151799

* Mandriva: 2010:050: apache-mod_security (Feb 26)
  ------------------------------------------------
  This release fixes several important issues to help prevent a
  detection bypass and denial of service attacks against ModSecurity.
  Quite a few small but notable bugs were fixed. The latest Core
  Ruleset (2.0.5) is included. [More...]

  http://www.linuxsecurity.com/content/view/151785

------------------------------------------------------------------------

* Red Hat: 2010:0130-01: java-1.5.0-ibm: Moderate Advisory (Mar 3)
  ----------------------------------------------------------------
  Updated java-1.5.0-ibm packages that fix a security issue are now
  available for Red Hat Enterprise Linux 4 Extras and 5 Supplementary.
  This update has been rated as having moderate security impact by the
  Red [More...]

  http://www.linuxsecurity.com/content/view/151832

* Red Hat: 2010:0129-01: cups: Moderate Advisory (Mar 3)
  ------------------------------------------------------
  Updated cups packages that fix one security issue are now available
  for Red Hat Enterprise Linux 5. This update has been rated as having
  moderate security impact by the Red [More...]

  http://www.linuxsecurity.com/content/view/151831

* Red Hat: 2010:0124-01: systemtap: Important Advisory (Mar 1)
  ------------------------------------------------------------
  Updated systemtap packages that fix two security issues are now
  available for Red Hat Enterprise Linux 5. This update has been rated
  as having important security impact by the Red [More...]

  http://www.linuxsecurity.com/content/view/151809

* Red Hat: 2010:0125-01: systemtap: Moderate Advisory (Mar 1)
  -----------------------------------------------------------
  Updated systemtap packages that fix a security issue are now
  available for Red Hat Enterprise Linux 4. This update has been rated
  as having moderate security impact by the Red [More...]

  http://www.linuxsecurity.com/content/view/151810

* Red Hat: 2010:0126-01: kvm: Important Advisory (Mar 1)
  ------------------------------------------------------
  Updated kvm packages that fix two security issues and two bugs are
  now available for Red Hat Enterprise Linux 5. This update has been
  rated as having important security impact by the Red [More...]

  http://www.linuxsecurity.com/content/view/151808

* Red Hat: sudo (Feb 26)
  ----------------------
  An updated sudo package that fixes two security issues is now
  available for Red Hat Enterprise Linux 5. This update has been rated
  as having important security impact by the Red Hat Security Response
  Team.

  http://www.linuxsecurity.com/content/view/151784

------------------------------------------------------------------------

* Slackware: 2010-060-01: seamonkey: Security Update (Mar 2)
  ----------------------------------------------------------
  New seamonkey packages are available for Slackware 12.2, 13.0, and
  -current to fix security issues. For more information, see:  [More
  Info...]

  http://www.linuxsecurity.com/content/view/151816

* Slackware:   openssl (Mar 1)
  ----------------------------
  New openssl packages are available for Slackware 11.0, 12.0, 12.1,
  12.2, 13.0, and -current to fix security issues. More details about
  this issue may be found in the Common Vulnerabilities and Exposures
  (CVE) database:

  http://www.linuxsecurity.com/content/view/151813

* Slackware:   gzip (Mar 1)
  -------------------------
  New gzip packages are available for Slackware 13.0 (64-bit) and
  -current to fix a security issue. More details about this issue may
  be found in the Common Vulnerabilities and Exposures (CVE) database:

  http://www.linuxsecurity.com/content/view/151814

------------------------------------------------------------------------

* SuSE: 2010-015: Mozilla Firefox (Mar 4)
  ---------------------------------------
  Mozilla Firefox was upgraded to version 3.5.8, fixing various bugs
  and security issues. On openSUSE 11.0 and 11.1 Mozilla Firefox was
  updated to version 3.0.18. On openSUSE 11.2 Mozilla Seamonkey was
  updated to version 2.0.2. Following security issues have been fixed:
  MFSA 2010-01 / CVE-2010-0159: Mozilla developers identified and fixed
  several stability bugs in the browser  [More...]

  http://www.linuxsecurity.com/content/view/151834

* SuSE: 2010-014: Linux kernel (Mar 3)
  ------------------------------------
  The SUSE Linux Enterprise 11 and openSUSE 11.1 Kernel were updated to
  2.6.27.45 fixing various bugs and security issues. CVE-2010-0622: The
  wake_futex_pi function in kernel/futex.c in the Linux kernel before
  2.6.33-rc7 does not properly handle certain unlock operations for a
  Priority Inheritance (PI) futex, which allows local  [More...]

  http://www.linuxsecurity.com/content/view/151824

------------------------------------------------------------------------

* Ubuntu: 906-1: CUPS vulnerabilities (Mar 3)
  -------------------------------------------
  It was discovered that the CUPS scheduler did not properly handle
  certainnetwork operations. A remote attacker could exploit this flaw
  and cause theCUPS server to crash, resulting in a denial of service.
  This issue onlyaffected Ubuntu 8.04 LTS, 8.10, 9.04 and 9.10.
  (CVE-2009-3553,CVE-2010-0302) [More...]

  http://www.linuxsecurity.com/content/view/151833

* Ubuntu: 905-1: sudo vulnerabilities (Feb 26)
  --------------------------------------------
  It was discovered that sudo did not properly validate the path for
  the'sudoedit' pseudo-command. A local attacker could exploit this to
  executearbitrary code as root if sudo was configured to allow the
  attacker to usesudoedit. The sudoedit pseudo-command is not used in
  the defaultinstallation of Ubuntu. (CVE-2010-0426) [More...]

  http://www.linuxsecurity.com/content/view/151789

------------------------------------------------------------------------
Distributed by: Guardian Digital, Inc.                LinuxSecurity.com

     To unsubscribe email vuln-newsletter-request@xxxxxxxxxxxxxxxxx
         with "unsubscribe" in the subject of the message.
------------------------------------------------------------------------
------------------------------------------------------------------------
Distributed by: Guardian Digital, Inc.                LinuxSecurity.com

     To unsubscribe email vuln-newsletter-request@xxxxxxxxxxxxxxxxx
         with "unsubscribe" in the subject of the message.
------------------------------------------------------------------------


[Index of Archives]     [Fedora Announce]     [Linux Crypto]     [Kernel]     [Netfilter]     [Bugtraq]     [USB]     [Fedora Security]

  Powered by Linux