Linux Advisory Watch: September 17th, 2011

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



+----------------------------------------------------------------------+
| LinuxSecurity.com                               Linux Advisory Watch |
| September 17th, 2011                            Volume 12, Number 38 |
|                                                                      |
| Editorial Team:              Dave Wreski <dwreski@xxxxxxxxxxxxxxxxx> |
+----------------------------------------------------------------------+

Thank you for reading the Linux Advisory Watch Security Newsletter. The 
purpose of this document is to provide our readers with a quick summary of 
each week's vendor security bulletins and pointers on methods to improve 
the security posture of your open source system.

Vulnerabilities affect nearly every vendor virtually every week, so be 
sure to read through to find the updates your distributor have made 
available.

------------------------------------------------------------------------
* Debian: 2309-1: openssl: compromised certificate aut (Sep 13)
   -------------------------------------------------------------
   Several fraudulent SSL certificates have been found in the wild
   issued by the DigiNotar Certificate Authority, obtained through a
   security compromise of said company. After further updates on this
   incident, it has been determined that all of DigiNotar's signing
   certificates can no [More...]

   http://www.linuxsecurity.com/content/view/155823

* Debian: 2308-1: mantis: Multiple vulnerabilities (Sep 12)
   ---------------------------------------------------------
   Several vulnerabilities were found in Mantis, a web-based bug
   tracking system: Insufficient input validation could result in local
   file inclusion and cross-site scripting. [More...]

   http://www.linuxsecurity.com/content/view/155810

* Debian: 2304-1: squid3: buffer overflow (Sep 11)
   ------------------------------------------------
   Ben Hawkes discovered that squid3, a full featured Web Proxy cache
   (HTTP proxy), is vulnerable to a buffer overflow when processing
   gopher server replies. An attacker can exploit this flaw by
   connecting to a gopher server that returns lines longer than 4096
   bytes. This may result [More...]

   http://www.linuxsecurity.com/content/view/155804

* Debian: 2307-1: chromium-browser: Multiple vulnerabilities (Sep 11)
   -------------------------------------------------------------------
   Several vulnerabilities were discovered in the Chromium browser. The
   Common Vulnerabilities and Exposures project identifies the following
   problems: [More...]

   http://www.linuxsecurity.com/content/view/155803

* Debian: 2306-1: ffmpeg: Multiple vulnerabilities (Sep 11)
   ---------------------------------------------------------
   Several vulnerabilities have been discovered in ffmpeg, a multimedia
   player, server and encoder. The Common Vulnerabilities and Exposures
   project identifies the following [More...]

   http://www.linuxsecurity.com/content/view/155802

* Debian: 2303-2: linux-2.6: privilege escalation/denial (Sep 10)
   ---------------------------------------------------------------
   The linux-2.6 and user-mode-linux upgrades from DSA-2303-1 has caused
   a regression that can result in an oops during invalid accesses to
   /proc/<pid>/maps files. [More...]

   http://www.linuxsecurity.com/content/view/155801

------------------------------------------------------------------------

* Mandriva: 2011:134-1: rsyslog (Sep 17)
   --------------------------------------
   A vulnerability was discovered and corrected in rsyslog: Stack-based
   buffer overflow in the parseLegacySyslogMsg function in
   tools/syslogd.c in rsyslogd in rsyslog 4.6.x before 4.6.8 and 5.2.0
   through 5.8.4 might allow remote attackers to cause a denial of
   [More...]

   http://www.linuxsecurity.com/content/view/155843

* Mandriva: 2011:132-1: pidgin (Sep 17)
   -------------------------------------
   Multiple vulnerabilities has been identified and fixed in pidgin: It
   was found that the gdk-pixbuf GIF image loader routine
   gdk_pixbuf__gif_image_load() did not properly handle certain return
   values from its subroutines. A remote attacker could provide a
   [More...]

   http://www.linuxsecurity.com/content/view/155842

* Mandriva: 2011:130-1: apache (Sep 17)
   -------------------------------------
   Multiple vulnerabilities has been discovered and corrected in apache:
   The byterange filter in the Apache HTTP Server 1.3.x, 2.0.x through
   2.0.64, and 2.2.x through 2.2.19 allows remote attackers to cause a
   denial of service (memory and CPU consumption) via a Range header
   [More...]

   http://www.linuxsecurity.com/content/view/155841

* Mandriva: 2011:134: rsyslog (Sep 9)
   -----------------------------------
   A vulnerability was discovered and corrected in rsyslog: Stack-based
   buffer overflow in the parseLegacySyslogMsg function in
   tools/syslogd.c in rsyslogd in rsyslog 4.6.x before 4.6.8 and 5.2.0
   through 5.8.4 might allow remote attackers to cause a denial of
   [More...]

   http://www.linuxsecurity.com/content/view/155795

------------------------------------------------------------------------

* Red Hat: 2011:1300-01: httpd: Important Advisory (Sep 15)
   ---------------------------------------------------------
   Updated httpd packages that fix one security issue are now available
   for Red Hat Enterprise Linux 3 Extended Life Cycle Support. The Red
   Hat Security Response Team has rated this update as having [More...]

   http://www.linuxsecurity.com/content/view/155835

* Red Hat: 2011:1294-01: httpd: Important Advisory (Sep 14)
   ---------------------------------------------------------
   Updated httpd packages that fix one security issue are now available
   for Red Hat Enterprise Linux 5.3 Long Life, 5.6 Extended Update
   Support, and 6.0 Extended Update Support. [More...]

   http://www.linuxsecurity.com/content/view/155829

* Red Hat: 2011:1293-01: squid: Moderate Advisory (Sep 14)
   --------------------------------------------------------
   An updated squid package that fixes one security issue is now
   available for Red Hat Enterprise Linux 6. The Red Hat Security
   Response Team has rated this update as having moderate [More...]

   http://www.linuxsecurity.com/content/view/155828

* Red Hat: 2011:1289-01: librsvg2: Moderate Advisory (Sep 13)
   -----------------------------------------------------------
   Updated librsvg2 packages that fix one security issue are now
   available for Red Hat Enterprise Linux 6. The Red Hat Security
   Response Team has rated this update as having moderate [More...]

   http://www.linuxsecurity.com/content/view/155818

* Red Hat: 2011:1253-01: kernel-rt: Important Advisory (Sep 12)
   -------------------------------------------------------------
   Updated kernel-rt packages that fix multiple security issues and
   various bugs are now available for Red Hat Enterprise MRG 2.0. The
   Red Hat Security Response Team has rated this update as having
   [More...]

   http://www.linuxsecurity.com/content/view/155811

* Red Hat: 2011:1282-01: nss and nspr: Important Advisory (Sep 12)
   ----------------------------------------------------------------
   Updated nss and nspr packages that fix one security issue are now
   available for Red Hat Enterprise Linux 4, 5, and 6. The Red Hat
   Security Response Team has rated this update as having [More...]

   http://www.linuxsecurity.com/content/view/155812

------------------------------------------------------------------------

* Slackware: 2011-252-01: httpd: Security Update (Sep 9)
   ------------------------------------------------------
   Not long ago, httpd package updates were issued to clamp down on a
   denial of  service bug that's seen some action in the wild.  New
   packages are available for Slackware 12.0, 12.1, 12.2, 13.0, 13.1,
   13.37, and -current.	[More Info...]

   http://www.linuxsecurity.com/content/view/155796

------------------------------------------------------------------------

* Ubuntu: 1208-1: Linux kernel (Marvel DOVE) vulnerabilities (Sep 14)
   -------------------------------------------------------------------
   Multiple kernel flaws have been fixed.

   http://www.linuxsecurity.com/content/view/155830

* Ubuntu: 1207-1: CUPS vulnerabilities (Sep 14)
   ---------------------------------------------
   An attacker could send crafted print jobs to CUPS and cause it to
   crash orrun programs.

   http://www.linuxsecurity.com/content/view/155827

* Ubuntu: 1204-1: Linux kernel (i.MX51) vulnerabilities (Sep 13)
   --------------------------------------------------------------
   Multiple kernel flaws have been fixed.

   http://www.linuxsecurity.com/content/view/155821

* Ubuntu: 1203-1: Linux kernel (Marvel DOVE) vulnerabilities (Sep 13)
   -------------------------------------------------------------------
   Multiple kernel flaws have been fixed.

   http://www.linuxsecurity.com/content/view/155822

* Ubuntu: 1201-1: Linux kernel vulnerabilities (Sep 13)
   -----------------------------------------------------
   Multiple kernel flaws have been fixed.

   http://www.linuxsecurity.com/content/view/155819

* Ubuntu: 1202-1: Linux kernel (OMAP4) vulnerabilities (Sep 13)
   -------------------------------------------------------------
   Multiple kernel flaws have been fixed.

   http://www.linuxsecurity.com/content/view/155820

* Ubuntu: 1200-1: Quassel vulnerability (Sep 10)
   ----------------------------------------------
   A remote attacker could send crafted input to Quassel and cause it
   tocrash.

   http://www.linuxsecurity.com/content/view/155800

* Ubuntu: 1197-5: CA Certificates vulnerability (Sep 9)
   -----------------------------------------------------
   A certificate authority mis-issued fraudulent certificates.

   http://www.linuxsecurity.com/content/view/155794

------------------------------------------------------------------------
Distributed by: Guardian Digital, Inc.                LinuxSecurity.com

     To unsubscribe email vuln-newsletter-request@xxxxxxxxxxxxxxxxx
         with "unsubscribe" in the subject of the message.
------------------------------------------------------------------------



[Index of Archives]     [Fedora Announce]     [Linux Crypto]     [Kernel]     [Netfilter]     [Bugtraq]     [USB]     [Fedora Security]

  Powered by Linux