Linux Advisory Watch: January 15th, 2011

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



+----------------------------------------------------------------------+
| LinuxSecurity.com                               Linux Advisory Watch |
| January 15th, 2011                               Volume 12, Number 3 |
|                                                                      |
| Editorial Team:              Dave Wreski <dwreski@xxxxxxxxxxxxxxxxx> |
|                       Benjamin D. Thomas <bthomas@xxxxxxxxxxxxxxxxx> |
+----------------------------------------------------------------------+

Thank you for reading the Linux Advisory Watch Security Newsletter. The 
purpose of this document is to provide our readers with a quick summary of 
each week's vendor security bulletins and pointers on methods to improve 
the security posture of your open source system.

Vulnerabilities affect nearly every vendor virtually every week, so be 
sure to read through to find the updates your distributor have made 
available.

Review: The Official Ubuntu Book
--------------------------------
If you haven't used Linux before, are new to Ubuntu, or would like a
quick update on the latest in open source advancements for the desktop,
then The Official Ubuntu Book is a great place to start.

http://www.linuxsecurity.com/content/view/153159

-->  Take advantage of the LinuxSecurity.com Quick Reference Card!  <--
-->  http://www.linuxsecurity.com/docs/QuickRefCard.pdf             <--

------------------------------------------------------------------------

* EnGarde Secure Community 3.0.22 Now Available!
   ----------------------------------------------
   Guardian Digital is happy to announce the release of EnGarde Secure
   Community 3.0.22 (Version 3.0, Release 22).  This release includes
   many updated packages and bug fixes and some feature enhancements to
   the EnGarde Secure Linux Installer and the SELinux policy.

   http://www.linuxsecurity.com/content/view/145668

------------------------------------------------------------------------

* Debian: 2144-1: wireshark: buffer overflow (Jan 14)
   ---------------------------------------------------
   It was discovered that a buffer overflow in the ENTTEC dissector may
   lead to the execution of arbitrary code. [More...]

   http://www.linuxsecurity.com/content/view/154144

* Debian: 2143-1: mysql-dfsg-5.0: several vulnerabilities (Jan 14)
   ----------------------------------------------------------------
   Several vulnerabilities have been discovered in the MySQL database
   server. The Common Vulnerabilities and Exposures project identifies
   the [More...]

   http://www.linuxsecurity.com/content/view/154135

* Debian: 2141-4: lighttpd: compatibility problem with (Jan 12)
   -------------------------------------------------------------
   The openssl update in DSA-2141-1 caused a regression in lighttpd. Due
   to a bug in lighttpd, the server fails to start in some
   configurations if using the updated openssl libraries. This update
   fixes this problem. [More...]

   http://www.linuxsecurity.com/content/view/154122

* Debian: 2122-2: glibc: missing input sanitization (Jan 11)
   ----------------------------------------------------------
   Colin Watson discovered that the update for stable relased in
   DSA-2122-1 did not complete address the underlying security issue in
   all possible scenarios. [More...]

   http://www.linuxsecurity.com/content/view/154110

------------------------------------------------------------------------

* Gentoo: 201101-03: libvpx: User-assisted execution of arbitrary code (Jan 14)
   -----------------------------------------------------------------------------
   Timothy B. Terriberry discovered that libvpx contains an
   integeroverflow vulnerability in the processing of video streams that
   mayallow user-assisted execution of arbitrary code.

   http://www.linuxsecurity.com/content/view/154146

* Gentoo: 201101-02: Tor: Remote heap-based buffer overflow (Jan 14)
   ------------------------------------------------------------------
   Tor is vulnerable to a heap-based buffer overflow that may
   allowarbitrary code execution.

   http://www.linuxsecurity.com/content/view/154145

------------------------------------------------------------------------

* Mandriva: 2011:009: gif2png (Jan 14)
   ------------------------------------
   A vulnerability has been found and corrected in gif2png: Stack-based
   buffer overflow in gif2png.c in gif2png 2.5.3 and earlier might allow
   context-dependent attackers to execute arbitrary code via a long
   command-line argument, as demonstrated by a CGI program [More...]

   http://www.linuxsecurity.com/content/view/154143

* Mandriva: 2011:008: perl-CGI (Jan 14)
   -------------------------------------
   A vulnerability has been found and corrected in perl-CGI: Unspecified
   vulnerability in CGI.pm 3.50 and earlier allows remote attackers to
   inject arbitrary HTTP headers and conduct HTTP response splitting
   attacks via unknown vectors.	NOTE: this issue exists [More...]

   http://www.linuxsecurity.com/content/view/154142

* Mandriva: 2011:007: wireshark (Jan 14)
   --------------------------------------
   A vulnerability has been found and corrected in wireshark: Buffer
   overflow in the MAC-LTE dissector (epan/dissectors/packet-mac-lte.c)
   in Wireshark 1.2.0 through 1.2.13 and 1.4.0 through 1.4.2 allows
   remote attackers to cause a denial [More...]

   http://www.linuxsecurity.com/content/view/154141

* Mandriva: 2011:006: subversion (Jan 14)
   ---------------------------------------
   Multiple vulnerabilities has been found and corrected in subversion:
   The walk function in repos.c in the mod_dav_svn module for the Apache
   HTTP Server, as distributed in Apache Subversion before 1.6.15,
   allows remote authenticated users to cause a denial of service (NULL
   [More...]

   http://www.linuxsecurity.com/content/view/154136

* Mandriva: 2011:005: evince (Jan 13)
   -----------------------------------
   Multiple vulnerabilities has been found and corrected in evince:
   Array index error in the PK and VF font parser in the dvi-backend
   component in Evince 2.32 and earlier allows remote attackers to cause
   a denial of service (application crash) or possibly execute [More...]

   http://www.linuxsecurity.com/content/view/154128

* Mandriva: 2011:004: php-phar (Jan 10)
   -------------------------------------
   A vulnerability has been found and corrected in php-phar: Multiple
   format string vulnerabilities in the phar extension in PHP 5.3 before
   5.3.2 allow context-dependent attackers to obtain sensitive
   information (memory contents) and possibly execute arbitrary code
   [More...]

   http://www.linuxsecurity.com/content/view/154104

* Mandriva: 2011:003: MHonArc (Jan 10)
   ------------------------------------
   Multiple vulnerabilities has been found and corrected in MHonArc:
   MHonArc 2.6.16 allows remote attackers to cause a denial of service
   (CPU consumption) via start tags that are placed within other start
   tags, as demonstrated by a <bo<bo<bo<bo<body>dy>dy>dy>dy>
   sequence, [More...]

   http://www.linuxsecurity.com/content/view/154099

* Mandriva: 2011:002: wireshark (Jan 9)
   -------------------------------------
   A vulnerability has been found and corrected in wireshark: Buffer
   overflow in epan/dissectors/packet-enttec.c in Wireshark 1.4.2 allows
   remote attackers to cause a denial of service (application crash) or
   possibly execute arbitrary code via a crafted ENTTEC DMX [More...]

   http://www.linuxsecurity.com/content/view/154094

* Mandriva: 2011:001: dhcp (Jan 7)
   --------------------------------
   A vulnerability has been found and corrected in dhcp: ISC DHCP server
   4.2 before 4.2.0-P2, when configured to use failover partnerships,
   allows remote attackers to cause a denial of service
   (communications-interrupted state and DHCP client service loss)
   [More...]

   http://www.linuxsecurity.com/content/view/154090

------------------------------------------------------------------------

* Red Hat: 2011:0028-01: kvm: Low Advisory (Jan 13)
   -------------------------------------------------
   Updated kvm packages that fix one security issue and several bugs are
   now available for Red Hat Enterprise Linux 5. The Red Hat Security
   Response Team has rated this update as having low [More...]

   http://www.linuxsecurity.com/content/view/154126

* Red Hat: 2011:0027-01: python: Low Advisory (Jan 13)
   ----------------------------------------------------
   Updated python packages that fix multiple security issues, several
   bugs, and add two enhancements are now available for Red Hat
   Enterprise Linux 5. The Red Hat Security Response Team has rated this
   update as having low [More...]

   http://www.linuxsecurity.com/content/view/154125

* Red Hat: 2011:0025-01: gcc: Low Advisory (Jan 13)
   -------------------------------------------------
   Updated gcc packages that fix two security issues and several
   compiler bugs are now available for Red Hat Enterprise Linux 5. The
   Red Hat Security Response Team has rated this update as having low
   [More...]

   http://www.linuxsecurity.com/content/view/154123

* Red Hat: 2011:0007-01: kernel: Important Advisory (Jan 11)
   ----------------------------------------------------------
   Updated kernel packages that fix multiple security issues and several
   bugs are now available for Red Hat Enterprise Linux 6. The Red Hat
   Security Response Team has rated this update as having [More...]

   http://www.linuxsecurity.com/content/view/154111

* Red Hat: 2011:0013-01: wireshark: Moderate Advisory (Jan 10)
   ------------------------------------------------------------
   Updated wireshark packages that fix one security issue are now
   available for Red Hat Enterprise Linux 4, 5, and 6. The Red Hat
   Security Response Team has rated this update as having moderate
   [More...]

   http://www.linuxsecurity.com/content/view/154102

------------------------------------------------------------------------

* Slackware: 2011-010-01: php: Security Update (Jan 10)
   -----------------------------------------------------
   New php packages are available for Slackware 11.0, 12.0, 12.1, 12.2,
   13.0, 13.1, and -current to fix a security issue.  [More Info...]

   http://www.linuxsecurity.com/content/view/154105

------------------------------------------------------------------------

* SuSE: 2011-004: Linux kernel (Jan 14)
   -------------------------------------
   The SUSE Linux Enterprise 11 Service Pack 1 kernel was updated to
   2.6.32.27 and fixes various bugs and security issues. Following
   security issues were fixed: CVE-2010-4258: A local attacker could use
   a Oops (kernel crash) caused by other flaws to write a 0 byte to a
   attacker controlled address  [More...]

   http://www.linuxsecurity.com/content/view/154140

* SuSE: Weekly Summary 2011:001 (Jan 11)
   --------------------------------------
   To avoid flooding mailing lists with SUSE Security Announcements for
   minor issues, SUSE Security releases weekly summary reports for the
   low profile vulnerability fixes. The SUSE Security Summary Reports do
   not list or download URLs like the SUSE Security Announcements that
   are released for more severe vulnerabilities.  List of
   vulnerabilities in this summary include: finch/pidgin,
   libmoon-devel/moonlight-plugin, libsmi, openssl, perl-CGI-Simple,
   supportutils, wireshark.

   http://www.linuxsecurity.com/content/view/154106

------------------------------------------------------------------------

* Ubuntu: 1042-2: PHP5 regression (Jan 13)
   ----------------------------------------
   USN-1042-1 fixed vulnerabilities in PHP5. The fix for
   CVE-2010-3436introduced a regression in the open_basedir restriction
   handling code.This update fixes the problem. [More...]

   http://www.linuxsecurity.com/content/view/154124

* Ubuntu: 1043-1: Little CMS vulnerability (Jan 12)
   -------------------------------------------------
   It was discovered that a NULL pointer dereference in the code
   forhandling transformations of monochrome profiles could allow an
   attackerto cause a denial of service through a specially crafted
   image.(CVE-2009-0793) [More...]

   http://www.linuxsecurity.com/content/view/154114

* Ubuntu: 1009-2: GNU C Library vulnerability (Jan 12)
   ----------------------------------------------------
   USN-1009-1 fixed vulnerabilities in the GNU C library. Colin
   Watsondiscovered that the fixes were incomplete and introduced flaws
   withsetuid programs loading libraries that used dynamic string tokens
   in theirRPATH. If the "man" program was installed setuid, a local
   attacker couldexploit this to gain "man" user privileges, potentially
   leading to further [More...]

   http://www.linuxsecurity.com/content/view/154113

* Ubuntu: 1042-1: PHP vulnerabilities (Jan 11)
   --------------------------------------------
   It was discovered that an integer overflow in the XML UTF-8
   decodingcode could allow an attacker to bypass cross-site scripting
   (XSS)protections. This issue only affected Ubuntu 6.06 LTS, Ubuntu
   8.04 LTS,and Ubuntu 9.10. (CVE-2009-5016) [More...]

   http://www.linuxsecurity.com/content/view/154112

* Ubuntu: 1041-1: Linux kernel vulnerabilities (Jan 10)
   -----------------------------------------------------
   Dan Rosenberg discovered that the btrfs filesystem did not
   correctlyvalidate permissions when using the clone function. A local
   attacker couldoverwrite the contents of file handles that were opened
   for append-only,or potentially read arbitrary contents, leading to a
   loss of privacy. OnlyUbuntu 9.10 was affected. (CVE-2010-2537,
   CVE-2010-2538) [More...]

   http://www.linuxsecurity.com/content/view/154103

------------------------------------------------------------------------
Distributed by: Guardian Digital, Inc.                LinuxSecurity.com

     To unsubscribe email vuln-newsletter-request@xxxxxxxxxxxxxxxxx
         with "unsubscribe" in the subject of the message.
------------------------------------------------------------------------



[Index of Archives]     [Fedora Announce]     [Linux Crypto]     [Kernel]     [Netfilter]     [Bugtraq]     [USB]     [Fedora Security]

  Powered by Linux