Linux Advisory Watch: December 10th, 2010

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



+----------------------------------------------------------------------+
| LinuxSecurity.com                               Linux Advisory Watch |
| December 10th, 2010                             Volume 11, Number 50 |
|                                                                      |
| Editorial Team:              Dave Wreski <dwreski@xxxxxxxxxxxxxxxxx> |
|                       Benjamin D. Thomas <bthomas@xxxxxxxxxxxxxxxxx> |
+----------------------------------------------------------------------+

Thank you for reading the Linux Advisory Watch Security Newsletter. The 
purpose of this document is to provide our readers with a quick summary of 
each week's vendor security bulletins and pointers on methods to improve 
the security posture of your open source system.

Vulnerabilities affect nearly every vendor virtually every week, so be 
sure to read through to find the updates your distributor have made 
available.

Review: The Official Ubuntu Book
--------------------------------
If you haven't used Linux before, are new to Ubuntu, or would like a
quick update on the latest in open source advancements for the desktop,
then The Official Ubuntu Book is a great place to start.

http://www.linuxsecurity.com/content/view/153159

-->  Take advantage of the LinuxSecurity.com Quick Reference Card!  <--
-->  http://www.linuxsecurity.com/docs/QuickRefCard.pdf             <--

------------------------------------------------------------------------

* EnGarde Secure Community 3.0.22 Now Available!
   ----------------------------------------------
   Guardian Digital is happy to announce the release of EnGarde Secure
   Community 3.0.22 (Version 3.0, Release 22).  This release includes
   many updated packages and bug fixes and some feature enhancements to
   the EnGarde Secure Linux Installer and the SELinux policy.

   http://www.linuxsecurity.com/content/view/145668

------------------------------------------------------------------------

* Debian: 2131-1: exim4: arbitrary code execution (Dec 10)
   --------------------------------------------------------
   Several vulnerabilities have been found in exim4 that allow a remote
   attacker to execute arbitrary code as root user. Exploits for these
   issues have been seen in the wild. [More...]

   http://www.linuxsecurity.com/content/view/153918

------------------------------------------------------------------------

* Mandriva: 2010:251: firefox (Dec 9)
   -----------------------------------
   Security issues were identified and fixed in firefox: Security
   researchers Yosuke Hasegawa and Masatoshi Kimura reported that the
   x-mac-arabic, x-mac-farsi and x-mac-hebrew character encodings are
   vulnerable to XSS attacks due to some characters being converted to
   [More...]

   http://www.linuxsecurity.com/content/view/153910

* Mandriva: 2010:250: perl-CGI-Simple (Dec 9)
   -------------------------------------------
   A vulnerability was discovered and corrected in perl-CGI-Simple: The
   multipart_init function in (1) CGI.pm before 3.50 and (2) Simple.pm
   in CGI::Simple 1.112 and earlier uses a hardcoded value of the MIME
   boundary string in multipart/x-mixed-replace content, which allows
   [More...]

   http://www.linuxsecurity.com/content/view/153903

* Mandriva: 2010:249: clamav (Dec 7)
   ----------------------------------
   Multiple vulnerabilities were discovered and corrected in clamav:
   Multiple unspecified vulnerabilities in pdf.c in libclamav in ClamAV
   before 0.96.5 allow remote attackers to cause a denial of service
   (application crash) or possibly execute arbitrary code via a crafted
   [More...]

   http://www.linuxsecurity.com/content/view/153879

* Mandriva: 2010:248: openssl (Dec 7)
   -----------------------------------
   A vulnerability was discovered and corrected in openssl: OpenSSL
   before 0.9.8q, and 1.0.x before 1.0.0c, when
   SSL_OP_NETSCAPE_REUSE_CIPHER_CHANGE_BUG is enabled, does not properly
   prevent modification of the ciphersuite in the session cache, which
   [More...]

   http://www.linuxsecurity.com/content/view/153878

* Mandriva: 2010:247: kernel (Dec 3)
   ----------------------------------
   A vulnerability was discovered and corrected in the Linux 2.6 kernel:
   The compat_alloc_user_space functions in include/asm/compat.h files
   in the Linux kernel before 2.6.36-rc4-git2 on 64-bit platforms do not
   properly allocate the userspace memory required for the 32-bit
   [More...]

   http://www.linuxsecurity.com/content/view/153861

------------------------------------------------------------------------

* Red Hat: 2010:0967-01: seamonkey: Critical Advisory (Dec 9)
   -----------------------------------------------------------
   Updated seamonkey packages that fix several security issues are now
   available for Red Hat Enterprise Linux 4. The Red Hat Security
   Response Team has rated this update as having critical [More...]

   http://www.linuxsecurity.com/content/view/153908

* Red Hat: 2010:0969-02: thunderbird: Moderate Advisory (Dec 9)
   -------------------------------------------------------------
   An updated thunderbird package that fixes several security issues is
   now available for Red Hat Enterprise Linux 6. The Red Hat Security
   Response Team has rated this update as having moderate [More...]

   http://www.linuxsecurity.com/content/view/153909

* Red Hat: 2010:0968-01: thunderbird: Moderate Advisory (Dec 9)
   -------------------------------------------------------------
   An updated thunderbird package that fixes several security issues is
   now available for Red Hat Enterprise Linux 4 and 5. The Red Hat
   Security Response Team has rated this update as having moderate
   [More...]

   http://www.linuxsecurity.com/content/view/153905

* Red Hat: 2010:0966-01: firefox: Critical Advisory (Dec 9)
   ---------------------------------------------------------
   Updated firefox packages that fix several security issues are now
   available for Red Hat Enterprise Linux 4, 5, and 6. The Red Hat
   Security Response Team has rated this update as having critical
   [More...]

   http://www.linuxsecurity.com/content/view/153906

* Red Hat: 2010:0958-01: kernel-rt: Important Advisory (Dec 8)
   ------------------------------------------------------------
   Updated kernel-rt packages that fix multiple security issues and
   three bugs are now available for Red Hat Enterprise MRG 1.3. The Red
   Hat Security Response Team has rated this update as having [More...]

   http://www.linuxsecurity.com/content/view/153892

* Red Hat: 2010:0950-01: apr-util: Moderate Advisory (Dec 7)
   ----------------------------------------------------------
   Updated apr-util packages that fix one security issue are now
   available for Red Hat Enterprise Linux 4, 5, and 6. The Red Hat
   Security Response Team has rated this update as having moderate
   [More...]

   http://www.linuxsecurity.com/content/view/153881

* Red Hat: 2010:0898-01: kvm: Moderate Advisory (Dec 6)
   -----------------------------------------------------
   Updated kvm packages that fix one security issue are now available
   for Red Hat Enterprise Linux 5. The Red Hat Security Response Team
   has rated this update as having moderate [More...]

   http://www.linuxsecurity.com/content/view/153865

* Red Hat: 2010:0945-01: quagga: Moderate Advisory (Dec 6)
   --------------------------------------------------------
   Updated quagga packages that fix two security issues are now
   available for Red Hat Enterprise Linux 6. The Red Hat Security
   Response Team has rated this update as having moderate [More...]

   http://www.linuxsecurity.com/content/view/153866

------------------------------------------------------------------------

* Slackware: 2010-343-01: mozilla-firefox: Security Update (Dec 10)
   -----------------------------------------------------------------
   New mozilla-firefox packages are available for Slackware 13.0, 13.1,
   and -current to fix security issues.	[More Info...]

   http://www.linuxsecurity.com/content/view/153912

* Slackware: 2010-343-02: mozilla-thunderbird: Security Update (Dec 10)
   ---------------------------------------------------------------------
   New mozilla-thunderbird packages are available for Slackware 13.0,
   13.1, and -current to fix security issues.  [More Info...]

   http://www.linuxsecurity.com/content/view/153913

* Slackware: 2010-340-01: openssl: Security Update (Dec 7)
   --------------------------------------------------------
   New openssl packages are available for Slackware 11.0, 12.0, 12.1,
   12.2, 13.0, 13.1, and -current to fix security issues.  [More
   Info...]

   http://www.linuxsecurity.com/content/view/153868

------------------------------------------------------------------------

* SuSE: 2010-058: acoread (Dec 8)
   -------------------------------
   Specially crafted PDF documents could crash acroread or lead to
   execution of arbitrary code. acroread was updated to version 9.4.1
   which addresses the issues.

   http://www.linuxsecurity.com/content/view/153891

* SuSE: Weekly Summary 2010:023 (Dec 8)
   -------------------------------------
   To avoid flooding mailing lists with SUSE Security Announcements for
   minor issues, SUSE Security releases weekly summary reports for the
   low profile vulnerability fixes. The SUSE Security Summary Reports do
   not list or download URLs like the SUSE Security Announcements that
   are released for more severe vulnerabilities.  List of
   vulnerabilities in this summary include: libxml2, tomboy, krb5, php5,
   cups, java-1_6_0-openjdk, epiphany, encfs.

   http://www.linuxsecurity.com/content/view/153890

------------------------------------------------------------------------

* Ubuntu: 1031-1: ClamAV vulnerabilities (Dec 9)
   ----------------------------------------------
   Arkadiusz Miskiewicz and others discovered that the PDF
   processingcode in libclamav improperly validated input. This could
   allow aremote attacker to craft a PDF document that could crash
   clamav orpossibly execute arbitrary code. (CVE-2010-4260,
   CVE-2010-4479) [More...]

   http://www.linuxsecurity.com/content/view/153907

* Ubuntu: 1019-1: Firefox and Xulrunner vulnerabilities (Dec 9)
   -------------------------------------------------------------
   Jesse Ruderman, Andreas Gal, Nils, Brian Hackett, and Igor
   Bukanovdiscovered several memory issues in the browser engine. An
   attacker couldexploit these to crash the browser or possibly run
   arbitrary code as theuser invoking the program. (CVE-2010-3776,
   CVE-2010-3777, CVE-2010-3778) [More...]

   http://www.linuxsecurity.com/content/view/153904

* Ubuntu: 1030-1: Kerberos vulnerabilities (Dec 9)
   ------------------------------------------------
   It was discovered that Kerberos did not properly determine
   theacceptability of certain checksums. A remote attacker could use
   certainchecksums to alter the prompt message, modify a response to a
   KeyDistribution Center (KDC) or forge a KRB-SAFE message.
   (CVE-2010-1323) [More...]

   http://www.linuxsecurity.com/content/view/153902

* Ubuntu: 1029-1: OpenSSL vulnerabilities (Dec 7)
   -----------------------------------------------
   It was discovered that an old bug workaround in the SSL/TLSserver
   code allowed an attacker to modify the stored session
   cacheciphersuite. This could possibly allow an attacker to downgrade
   theciphersuite to a weaker one on subsequent connections.
   (CVE-2010-4180) [More...]

   http://www.linuxsecurity.com/content/view/153882

* Ubuntu: 1026-1: Python Paste vulnerability (Dec 7)
   --------------------------------------------------
   It was discovered that Python Paste did not properly sanitize
   certainstrings, resulting in cross-site scripting (XSS)
   vulnerabilities. Withcross-site scripting vulnerabilities, if a user
   were tricked into viewingserver output during a crafted server
   request, a remote attacker couldexploit this to modify the contents,
   or steal confidential data, within [More...]

   http://www.linuxsecurity.com/content/view/153880

------------------------------------------------------------------------
Distributed by: Guardian Digital, Inc.                LinuxSecurity.com

     To unsubscribe email vuln-newsletter-request@xxxxxxxxxxxxxxxxx
         with "unsubscribe" in the subject of the message.
------------------------------------------------------------------------



[Index of Archives]     [Fedora Announce]     [Linux Crypto]     [Kernel]     [Netfilter]     [Bugtraq]     [USB]     [Fedora Security]

  Powered by Linux