Linux Advisory Watch: April 8th, 2011

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



+----------------------------------------------------------------------+
| LinuxSecurity.com                               Linux Advisory Watch |
| April 8th, 2011                                 Volume 12, Number 15 |
|                                                                      |
| Editorial Team:              Dave Wreski <dwreski@xxxxxxxxxxxxxxxxx> |
|                       Benjamin D. Thomas <bthomas@xxxxxxxxxxxxxxxxx> |
+----------------------------------------------------------------------+

Thank you for reading the Linux Advisory Watch Security Newsletter. The 
purpose of this document is to provide our readers with a quick summary of 
each week's vendor security bulletins and pointers on methods to improve 
the security posture of your open source system.

Vulnerabilities affect nearly every vendor virtually every week, so be 
sure to read through to find the updates your distributor have made 
available.

Book Review: Linux Kernel Programming
-------------------------------------
As Linux is implemented on increasingly wider number of devices, the
number of people responsible for developing and maintaining Linux on
those platforms have increased. As the level of maturity of the kernel
increases, so does the complexity, capabilities, and size. This book
provides the Linux programmer the tools necessary to understand the
core aspects of the kernel and how to interface with it.

http://www.linuxsecurity.com/content/view/154775

------------------------------------------------------------------------

* Debian: 2214-1: ikiwiki: missing input validation (Apr 8)
   ---------------------------------------------------------
   Tango discovered that ikiwiki, a wiki compiler, is not validating if
   the htmlscrubber plugin is enabled or not on a page when adding
   alternative stylesheets to pages. This enables an attacker who is
   able to upload custom stylesheets to add malicious stylesheets as an
   alternate [More...]

   http://www.linuxsecurity.com/content/view/154834

* Debian: 2213-1: x11-xserver-utils: missing input sanitization (Apr 8)
   ---------------------------------------------------------------------
   Sebastian Krahmer discovered that the xrdb utility of
   x11-xserver-utils, a X server resource database utility, is not
   properly filtering crafted hostnames. This allows a remote attacker
   to execute arbitrary code with root privileges given that either
   remote logins via xdmcp are allowed or [More...]

   http://www.linuxsecurity.com/content/view/154833

* Debian: 2212-1: tmux: privilege escalation (Apr 7)
   --------------------------------------------------
   Daniel Danner discovered that tmux, a terminal multiplexer, is not
   properly dropping group privileges. Due to a patch introduced by
   Debian, when invoked with the -S option, tmux is not dropping
   permissions obtained through its setgid installation. [More...]

   http://www.linuxsecurity.com/content/view/154815

* Debian: 2211-1: vlc: missing input sanitising (Apr 6)
   -----------------------------------------------------
   Ricardo Narvaja discovered that missing input sanitising in VLC, a
   multimedia player and streamer, could lead to the execution of
   arbitrary code if a user is tricked into opening a malformed media
   file. [More...]

   http://www.linuxsecurity.com/content/view/154804

* Debian: 2210-1: tiff: Multiple vulnerabilities (Apr 3)
   ------------------------------------------------------
   Several vulnearbilities were discovered in the TIFF manipulation and
   conversion library: CVE-2011-0191 [More...]

   http://www.linuxsecurity.com/content/view/154772

* Debian: 2209-1: tgt: double free (Apr 2)
   ----------------------------------------
   Emmanuel Bouillon discovered a double free in tgt, the Linux SCSI
   target user-space tools, which could lead to denial of service. The
   oldstable distribution (lenny) doesn't include tgt. [More...]

   http://www.linuxsecurity.com/content/view/154771

* Debian: 2208-2: bind9: denial of service (Mar 31)
   -------------------------------------------------
   The BIND, a DNS server, contains a defect related to the processing
   of new DNSSEC DS records by the caching resolver, which may lead to
   name resolution failures in the delegated zone. If DNSSEC validation
   is enabled, this issue can make domains ending in .COM unavailable
   when [More...]

   http://www.linuxsecurity.com/content/view/154752

------------------------------------------------------------------------

* Mandriva: 2011:072: gwenhywfar (Apr 8)
   --------------------------------------
   It was discovered that gwenhywfar was using an old private copy of
   the ca-bundle.crt file containing the root CA certs, this has now
   been resolved so that it uses the system wide and up to date
   /etc/pki/tls/certs/ca-bundle.crt file last updated with the
   MDVSA-2011:068 advisory. [More...]

   http://www.linuxsecurity.com/content/view/154828

* Mandriva: 2011:071: kdelibs4 (Apr 8)
   ------------------------------------
   A vulnerability has been found and corrected in kdelibs4:
   kio/kio/tcpslavebase.cpp in KDE KSSL in kdelibs before 4.6.1 does not
   properly verify that the server hostname matches the domain name of
   the subject of an X.509 certificate, which allows man-in-the-middle
   [More...]

   http://www.linuxsecurity.com/content/view/154826

* Mandriva: 2011:070: gdm (Apr 8)
   -------------------------------
   A vulnerability has been found and corrected in gdm: GNOME Display
   Manager (gdm) 2.x before 2.32.1 allows local users to change the
   ownership of arbitrary files via a symlink attack on a (1) dmrc or
   (2) face icon file under /var/cache/gdm/ (CVE-2011-0727). [More...]

   http://www.linuxsecurity.com/content/view/154825

* Mandriva: 2011:069: php (Apr 8)
   -------------------------------
   It was discovered that the /etc/cron.d/php cron job for php-session
   allows local users to delete arbitrary files via a symlink attack on
   a directory under /var/lib/php (CVE-2011-0441). Packages for 2009.0
   are provided as of the Extended Maintenance [More...]

   http://www.linuxsecurity.com/content/view/154824

* Mandriva: 2011:068: firefox (Apr 7)
   -----------------------------------
   Several invalid HTTPS certificates were placed on the certificate
   blacklist to prevent their misuse. Users on a compromised network
   could be directed to sites using the fraudulent certificates and
   mistake them for the legitimate [More...]

   http://www.linuxsecurity.com/content/view/154814

* Mandriva: 2011:067: subversion (Apr 6)
   --------------------------------------
   A vulnerability was discovered and corrected in subversion: The
   mod_dav_svn module for the Apache HTTP Server, as distributed in
   Apache Subversion before 1.6.16, allows remote attackers to cause a
   denial of service (NULL pointer dereference and daemon crash) via a
   [More...]

   http://www.linuxsecurity.com/content/view/154796

* Mandriva: 2011:066: rsync (Apr 5)
   ---------------------------------
   A vulnerability wase discovered and corrected in rsync: rsync 3.x
   before 3.0.8, when certain recursion, deletion, and ownership options
   are used, allows remote rsync servers to cause a denial of service
   (heap memory corruption and application crash) or possibly [More...]

   http://www.linuxsecurity.com/content/view/154791

* Mandriva: 2011:065: logrotate (Apr 5)
   -------------------------------------
   Multiple vulnerabilities were discovered and corrected in logrotate:
   Race condition in the createOutputFile function in logrotate.c in
   logrotate 3.7.9 and earlier allows local users to read log data by
   opening a file before the intended permissions are in place [More...]

   http://www.linuxsecurity.com/content/view/154790

* Mandriva: 2011:064: libtiff (Apr 4)
   -----------------------------------
   Multiple vulnerabilities were discovered and corrected in libtiff:
   Buffer overflow in LibTIFF allows remote attackers to execute
   arbitrary code or cause a denial of service (application crash) via a
   crafted TIFF image with JPEG encoding (CVE-2011-0191). [More...]

   http://www.linuxsecurity.com/content/view/154777

* Mandriva: 2011:063: xmlsec1 (Apr 4)
   -----------------------------------
   A vulnerability was discovered and corrected in xmlsec1: xslt.c in
   XML Security Library (aka xmlsec) before 1.2.17, as used in WebKit
   and other products, when XSLT is enabled, allows remote attackers to
   create or overwrite arbitrary files via vectors [More...]

   http://www.linuxsecurity.com/content/view/154773

* Mandriva: 2011:062: ffmpeg (Apr 1)
   ----------------------------------
   Multiple vulnerabilities has been identified and fixed in ffmpeg:
   FFmpeg 0.5 allows remote attackers to cause a denial of service
   (hang) via a crafted file that triggers an infinite loop.
   (CVE-2009-4636) [More...]

   http://www.linuxsecurity.com/content/view/154770

* Mandriva: 2011:061: ffmpeg (Apr 1)
   ----------------------------------
   Multiple vulnerabilities has been identified and fixed in ffmpeg:
   oggparsevorbis.c in FFmpeg 0.5 does not properly perform certain
   pointer arithmetic, which might allow remote attackers to obtain
   sensitive memory contents and cause a denial of service via a crafted
   [More...]

   http://www.linuxsecurity.com/content/view/154769

* Mandriva: 2011:060: ffmpeg (Apr 1)
   ----------------------------------
   Multiple vulnerabilities has been identified and fixed in ffmpeg:
   oggparsevorbis.c in FFmpeg 0.5 does not properly perform certain
   pointer arithmetic, which might allow remote attackers to obtain
   sensitive memory contents and cause a denial of service via a crafted
   [More...]

   http://www.linuxsecurity.com/content/view/154767

* Mandriva: 2011:059: ffmpeg (Apr 1)
   ----------------------------------
   Multiple vulnerabilities has been identified and fixed in ffmpeg:
   Multiple integer underflows in FFmpeg 0.5 allow remote attackers to
   cause a denial of service and possibly execute arbitrary code via a
   crafted file that (1) bypasses a validation check in vorbis_dec.c
   [More...]

   http://www.linuxsecurity.com/content/view/154766

* Mandriva: 2011:058: quagga (Apr 1)
   ----------------------------------
   Multiple vulnerabilities has been identified and fixed in quagga: The
   extended-community parser in bgpd in Quagga before 0.99.18 allows
   remote attackers to cause a denial of service (NULL pointer
   dereference and application crash) via a malformed Extended
   Communities attribute [More...]

   http://www.linuxsecurity.com/content/view/154761

* Mandriva: 2011:057: apache (Mar 31)
   -----------------------------------
   The configuration merger in itk.c in the Steinar H. Gunderson mpm-itk
   Multi-Processing Module (apache-mpm-itk) for the Apache HTTP Server
   does not properly handle certain configuration sections that specify
   NiceValue but not AssignUserID, which might allow remote attackers to
   gain privileges by leveraging the root uid and root gid of an mpm-itk
   [More...]

   http://www.linuxsecurity.com/content/view/154758

------------------------------------------------------------------------

* Red Hat: 2011:0428-01: dhcp: Important Advisory (Apr 8)
   -------------------------------------------------------
   Updated dhcp packages that fix one security issue are now available
   for Red Hat Enterprise Linux 4, 5, and 6. The Red Hat Security
   Response Team has rated this update as having [More...]

   http://www.linuxsecurity.com/content/view/154829

* Red Hat: 2011:0421-01: kernel: Important Advisory (Apr 7)
   ---------------------------------------------------------
   Updated kernel packages that fix multiple security issues and several
   bugs are now available for Red Hat Enterprise Linux 6. The Red Hat
   Security Response Team has rated this update as having [More...]

   http://www.linuxsecurity.com/content/view/154819

* Red Hat: 2011:0427-01: spice-xpi: Moderate Advisory (Apr 7)
   -----------------------------------------------------------
   An updated spice-xpi package that fixes one security issue is now
   available for Red Hat Enterprise Linux 5. The Red Hat Security
   Response Team has rated this update as having moderate [More...]

   http://www.linuxsecurity.com/content/view/154817

* Red Hat: 2011:0426-01: spice-xpi: Moderate Advisory (Apr 7)
   -----------------------------------------------------------
   An updated spice-xpi package that fixes two security issues is now
   available for Red Hat Enterprise Linux 6. The Red Hat Security
   Response Team has rated this update as having moderate [More...]

   http://www.linuxsecurity.com/content/view/154816

* Red Hat: 2011:0423-01: postfix: Moderate Advisory (Apr 6)
   ---------------------------------------------------------
   Updated postfix packages that fix one security issue are now
   available for Red Hat Enterprise Linux 6. The Red Hat Security
   Response Team has rated this update as having moderate [More...]

   http://www.linuxsecurity.com/content/view/154805

* Red Hat: 2011:0422-01: postfix: Moderate Advisory (Apr 6)
   ---------------------------------------------------------
   Updated postfix packages that fix two security issues are now
   available for Red Hat Enterprise Linux 4 and 5. The Red Hat Security
   Response Team has rated this update as having moderate [More...]

   http://www.linuxsecurity.com/content/view/154806

* Red Hat: 2011:0414-01: policycoreutils: Important Advisory (Apr 4)
   ------------------------------------------------------------------
   Updated policycoreutils packages that fix one security issue are now
   available for Red Hat Enterprise Linux 6. The Red Hat Security
   Response Team has rated this update as having [More...]

   http://www.linuxsecurity.com/content/view/154784

* Red Hat: 2011:0413-01: glibc: Important Advisory (Apr 4)
   --------------------------------------------------------
   Updated glibc packages that fix three security issues are now
   available for Red Hat Enterprise Linux 6. The Red Hat Security
   Response Team has rated this update as having [More...]

   http://www.linuxsecurity.com/content/view/154783

* Red Hat: 2011:0412-01: glibc: Important Advisory (Apr 4)
   --------------------------------------------------------
   Updated glibc packages that fix multiple security issues are now
   available for Red Hat Enterprise Linux 5. The Red Hat Security
   Response Team has rated this update as having [More...]

   http://www.linuxsecurity.com/content/view/154782

* Red Hat: 2011:0407-01: logrotate: Moderate Advisory (Mar 31)
   ------------------------------------------------------------
   An updated logrotate package that fixes multiple security issues is
   now available for Red Hat Enterprise Linux 6. The Red Hat Security
   Response Team has rated this update as having moderate [More...]

   http://www.linuxsecurity.com/content/view/154757

* Red Hat: 2011:0406-01: quagga: Moderate Advisory (Mar 31)
   ---------------------------------------------------------
   Updated quagga packages that fix two security issues are now
   available for Red Hat Enterprise Linux 6. The Red Hat Security
   Response Team has rated this update as having moderate [More...]

   http://www.linuxsecurity.com/content/view/154756

------------------------------------------------------------------------

* Slackware: 2011-097-01: dhcp: Security Update (Apr 7)
   -----------------------------------------------------
   New dhcp packages are available for Slackware 9.0, 9.1, 10.0, 10.1,
   10.2, 11.0, 12.0, 12.1, 12.2, 13.0, 13.1, and -current to fix a
   security issue.  [More Info...]

   http://www.linuxsecurity.com/content/view/154807

* Slackware: 2011-095-01: proftpd: Security Update (Apr 5)
   --------------------------------------------------------
   New proftpd packages are available for Slackware 11.0, 12.0, 12.1,
   12.2, 13.0, 13.1, and -current to fix security issues.  [More
   Info...]

   http://www.linuxsecurity.com/content/view/154785

------------------------------------------------------------------------

* SuSE: Weekly Summary 2011:006 (Apr 5)
   -------------------------------------
   To avoid flooding mailing lists with SUSE Security Announcements for
   minor issues, SUSE Security releases weekly summary reports for the
   low profile vulnerability fixes. The SUSE Security Summary Reports do
   not list or download URLs like the SUSE Security Announcements that
   are released for more severe vulnerabilities.  List of
   vulnerabilities in this summary include: apache2-mod_php5/php5,
   cobbler, evince, gdm, kdelibs4, otrs, quagga.

   http://www.linuxsecurity.com/content/view/154786

* SuSE: Weekly Summary 2011:005 (Apr 1)
   -------------------------------------
   To avoid flooding mailing lists with SUSE Security Announcements for
   minor issues, SUSE Security releases weekly summary reports for the
   low profile vulnerability fixes. The SUSE Security Summary Reports do
   not list or download URLs like the SUSE Security Announcements that
   are released for more severe vulnerabilities.

   http://www.linuxsecurity.com/content/view/154762

------------------------------------------------------------------------

* Ubuntu: 1107-1: x11-xserver-utils vulnerability (Apr 6)
   -------------------------------------------------------
   Sebastian Krahmer discovered that the xrdb utility incorrectly
   filteredcrafted hostnames. An attacker could use this flaw with a
   maliciousDHCP server or with a remote xdmcp login and execute
   arbitrary code,resulting in root privilege escalation. [More...]

   http://www.linuxsecurity.com/content/view/154803

* Ubuntu: 1106-1: NSS vulnerabilities (Apr 6)
   -------------------------------------------
   It was discovered that several invalid HTTPS certificates were issued
   andrevoked. An attacker could exploit these to perform a man in the
   middleattack to view sensitive information or alter encrypted
   communications.These certificates were marked as explicitly not
   trusted to prevent theirmisuse. [More...]

   http://www.linuxsecurity.com/content/view/154802

* Ubuntu: 1105-1: Linux kernel vulnerabilities (Apr 5)
   ----------------------------------------------------
   Dan Rosenberg discovered that multiple terminal ioctls did not
   correctlyinitialize structure memory. A local attacker could exploit
   this to readportions of kernel stack memory, leading to a loss of
   privacy.(CVE-2010-4075, CVE-2010-4076, CVE-2010-4077) [More...]

   http://www.linuxsecurity.com/content/view/154795

* Ubuntu: 1104-1: FFmpeg vulnerabilities (Apr 4)
   ----------------------------------------------
   Cesar Bernardini and Felipe Andres Manzano discovered that
   FFmpegincorrectly handled certain malformed flic files. If a user
   were trickedinto opening a crafted flic file, an attacker could cause
   a denial ofservice via application crash, or possibly execute
   arbitrary code with theprivileges of the user invoking the program.
   This issue only affected [More...]

   http://www.linuxsecurity.com/content/view/154778

* Ubuntu: 1103-1: tex-common vulnerability (Apr 4)
   ------------------------------------------------
   Mathias Svensson discovered that the tex-common package contains
   aninsecure shell_escape_commands configuration item. If a user or
   automatedsystem were tricked into opening a specially crafted TeX
   file, a remoteattacker could execute arbitrary code with user
   privileges. [More...]

   http://www.linuxsecurity.com/content/view/154779

* Ubuntu: 1102-1: tiff vulnerability (Apr 4)
   ------------------------------------------
   Martin Barbella discovered that the thunder (aka ThunderScan) decoder
   inthe TIFF library incorrectly handled an unexpected BitsPerSample
   value. Ifa user or automated system were tricked into opening a
   specially craftedTIFF image, a remote attacker could execute
   arbitrary code with userprivileges, or crash the application, leading
   to a denial of service. [More...]

   http://www.linuxsecurity.com/content/view/154780

* Ubuntu: 1101-1: Qt vulnerabilities (Apr 1)
   ------------------------------------------
   It was discovered that several invalid HTTPS certificates were issued
   andrevoked. An attacker could exploit these to perform a man in the
   middleattack to view sensitive information or alter encrypted
   communications.These were placed on the certificate blacklist to
   prevent their misuse. [More...]

   http://www.linuxsecurity.com/content/view/154768

* Ubuntu: 1100-1: OpenLDAP vulnerabilities (Mar 31)
   -------------------------------------------------
   It was discovered that OpenLDAP did not properly check
   forwardedauthentication failures when using a slave server and chain
   overlay. IfOpenLDAP were configured in this manner, an attacker could
   bypassauthentication checks by sending an invalid password to a slave
   server.(CVE-2011-1024) [More...]

   http://www.linuxsecurity.com/content/view/154754

------------------------------------------------------------------------

* Pardus: 2011-66: Subversion: Denial of Service (Apr 8)
   ------------------------------------------------------
   A vulnerabillity has been fixed in Subversion, which allows remote
   attackers to cause a denial of service.

   http://www.linuxsecurity.com/content/view/154823

* Pardus: 2011-65: Bind: Denial of Service (Apr 8)
   ------------------------------------------------
   A vulnerability has been fixed in bind, which allows remote attackers
   to cause a denial of service.

   http://www.linuxsecurity.com/content/view/154822

* Pardus: 2011-64: Libcgroup: Multible Vulnerability (Apr 8)
   ----------------------------------------------------------
   Multiple vulnerabilities have been fixed in libcgroup which can be
   used by malicious people to execute code or lead to privilege
   escalation.

   http://www.linuxsecurity.com/content/view/154821

* Pardus: 2011-63: Php: Multiple Vulnerabilities (Apr 8)
   ------------------------------------------------------
   Multible vulnerabilities have been fixed in php, which allow
   attackers to cause a denial of service, obtain sensitive information
   or possibly execute arbitrary code.

   http://www.linuxsecurity.com/content/view/154820

------------------------------------------------------------------------
Distributed by: Guardian Digital, Inc.                LinuxSecurity.com

     To unsubscribe email vuln-newsletter-request@xxxxxxxxxxxxxxxxx
         with "unsubscribe" in the subject of the message.
------------------------------------------------------------------------



[Index of Archives]     [Fedora Announce]     [Linux Crypto]     [Kernel]     [Netfilter]     [Bugtraq]     [USB]     [Fedora Security]

  Powered by Linux