Linux Advisory Watch: January 15th, 2011

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]


(追記) (追記ここまで)



+----------------------------------------------------------------------+
| LinuxSecurity.com Linux Advisory Watch |
| January 15th, 2011 Volume 12, Number 3 |
| |
| Editorial Team: Dave Wreski <dwreski@xxxxxxxxxxxxxxxxx> |
| Benjamin D. Thomas <bthomas@xxxxxxxxxxxxxxxxx> |
+----------------------------------------------------------------------+
Thank you for reading the Linux Advisory Watch Security Newsletter. The 
purpose of this document is to provide our readers with a quick summary of 
each week's vendor security bulletins and pointers on methods to improve 
the security posture of your open source system.
Vulnerabilities affect nearly every vendor virtually every week, so be 
sure to read through to find the updates your distributor have made 
available.
Review: The Official Ubuntu Book
--------------------------------
If you haven't used Linux before, are new to Ubuntu, or would like a
quick update on the latest in open source advancements for the desktop,
then The Official Ubuntu Book is a great place to start.
http://www.linuxsecurity.com/content/view/153159
--> Take advantage of the LinuxSecurity.com Quick Reference Card! <--
--> http://www.linuxsecurity.com/docs/QuickRefCard.pdf <--
------------------------------------------------------------------------
* EnGarde Secure Community 3.0.22 Now Available!
 ----------------------------------------------
 Guardian Digital is happy to announce the release of EnGarde Secure
 Community 3.0.22 (Version 3.0, Release 22). This release includes
 many updated packages and bug fixes and some feature enhancements to
 the EnGarde Secure Linux Installer and the SELinux policy.
 http://www.linuxsecurity.com/content/view/145668
------------------------------------------------------------------------
* Debian: 2144-1: wireshark: buffer overflow (Jan 14)
 ---------------------------------------------------
 It was discovered that a buffer overflow in the ENTTEC dissector may
 lead to the execution of arbitrary code. [More...]
 http://www.linuxsecurity.com/content/view/154144
* Debian: 2143-1: mysql-dfsg-5.0: several vulnerabilities (Jan 14)
 ----------------------------------------------------------------
 Several vulnerabilities have been discovered in the MySQL database
 server. The Common Vulnerabilities and Exposures project identifies
 the [More...]
 http://www.linuxsecurity.com/content/view/154135
* Debian: 2141-4: lighttpd: compatibility problem with (Jan 12)
 -------------------------------------------------------------
 The openssl update in DSA-2141-1 caused a regression in lighttpd. Due
 to a bug in lighttpd, the server fails to start in some
 configurations if using the updated openssl libraries. This update
 fixes this problem. [More...]
 http://www.linuxsecurity.com/content/view/154122
* Debian: 2122-2: glibc: missing input sanitization (Jan 11)
 ----------------------------------------------------------
 Colin Watson discovered that the update for stable relased in
 DSA-2122-1 did not complete address the underlying security issue in
 all possible scenarios. [More...]
 http://www.linuxsecurity.com/content/view/154110
------------------------------------------------------------------------
* Gentoo: 201101-03: libvpx: User-assisted execution of arbitrary code (Jan 14)
 -----------------------------------------------------------------------------
 Timothy B. Terriberry discovered that libvpx contains an
 integeroverflow vulnerability in the processing of video streams that
 mayallow user-assisted execution of arbitrary code.
 http://www.linuxsecurity.com/content/view/154146
* Gentoo: 201101-02: Tor: Remote heap-based buffer overflow (Jan 14)
 ------------------------------------------------------------------
 Tor is vulnerable to a heap-based buffer overflow that may
 allowarbitrary code execution.
 http://www.linuxsecurity.com/content/view/154145
------------------------------------------------------------------------
* Mandriva: 2011:009: gif2png (Jan 14)
 ------------------------------------
 A vulnerability has been found and corrected in gif2png: Stack-based
 buffer overflow in gif2png.c in gif2png 2.5.3 and earlier might allow
 context-dependent attackers to execute arbitrary code via a long
 command-line argument, as demonstrated by a CGI program [More...]
 http://www.linuxsecurity.com/content/view/154143
* Mandriva: 2011:008: perl-CGI (Jan 14)
 -------------------------------------
 A vulnerability has been found and corrected in perl-CGI: Unspecified
 vulnerability in CGI.pm 3.50 and earlier allows remote attackers to
 inject arbitrary HTTP headers and conduct HTTP response splitting
 attacks via unknown vectors.	NOTE: this issue exists [More...]
 http://www.linuxsecurity.com/content/view/154142
* Mandriva: 2011:007: wireshark (Jan 14)
 --------------------------------------
 A vulnerability has been found and corrected in wireshark: Buffer
 overflow in the MAC-LTE dissector (epan/dissectors/packet-mac-lte.c)
 in Wireshark 1.2.0 through 1.2.13 and 1.4.0 through 1.4.2 allows
 remote attackers to cause a denial [More...]
 http://www.linuxsecurity.com/content/view/154141
* Mandriva: 2011:006: subversion (Jan 14)
 ---------------------------------------
 Multiple vulnerabilities has been found and corrected in subversion:
 The walk function in repos.c in the mod_dav_svn module for the Apache
 HTTP Server, as distributed in Apache Subversion before 1.6.15,
 allows remote authenticated users to cause a denial of service (NULL
 [More...]
 http://www.linuxsecurity.com/content/view/154136
* Mandriva: 2011:005: evince (Jan 13)
 -----------------------------------
 Multiple vulnerabilities has been found and corrected in evince:
 Array index error in the PK and VF font parser in the dvi-backend
 component in Evince 2.32 and earlier allows remote attackers to cause
 a denial of service (application crash) or possibly execute [More...]
 http://www.linuxsecurity.com/content/view/154128
* Mandriva: 2011:004: php-phar (Jan 10)
 -------------------------------------
 A vulnerability has been found and corrected in php-phar: Multiple
 format string vulnerabilities in the phar extension in PHP 5.3 before
 5.3.2 allow context-dependent attackers to obtain sensitive
 information (memory contents) and possibly execute arbitrary code
 [More...]
 http://www.linuxsecurity.com/content/view/154104
* Mandriva: 2011:003: MHonArc (Jan 10)
 ------------------------------------
 Multiple vulnerabilities has been found and corrected in MHonArc:
 MHonArc 2.6.16 allows remote attackers to cause a denial of service
 (CPU consumption) via start tags that are placed within other start
 tags, as demonstrated by a <bo<bo<bo<bo<body>dy>dy>dy>dy>
 sequence, [More...]
 http://www.linuxsecurity.com/content/view/154099
* Mandriva: 2011:002: wireshark (Jan 9)
 -------------------------------------
 A vulnerability has been found and corrected in wireshark: Buffer
 overflow in epan/dissectors/packet-enttec.c in Wireshark 1.4.2 allows
 remote attackers to cause a denial of service (application crash) or
 possibly execute arbitrary code via a crafted ENTTEC DMX [More...]
 http://www.linuxsecurity.com/content/view/154094
* Mandriva: 2011:001: dhcp (Jan 7)
 --------------------------------
 A vulnerability has been found and corrected in dhcp: ISC DHCP server
 4.2 before 4.2.0-P2, when configured to use failover partnerships,
 allows remote attackers to cause a denial of service
 (communications-interrupted state and DHCP client service loss)
 [More...]
 http://www.linuxsecurity.com/content/view/154090
------------------------------------------------------------------------
* Red Hat: 2011:0028-01: kvm: Low Advisory (Jan 13)
 -------------------------------------------------
 Updated kvm packages that fix one security issue and several bugs are
 now available for Red Hat Enterprise Linux 5. The Red Hat Security
 Response Team has rated this update as having low [More...]
 http://www.linuxsecurity.com/content/view/154126
* Red Hat: 2011:0027-01: python: Low Advisory (Jan 13)
 ----------------------------------------------------
 Updated python packages that fix multiple security issues, several
 bugs, and add two enhancements are now available for Red Hat
 Enterprise Linux 5. The Red Hat Security Response Team has rated this
 update as having low [More...]
 http://www.linuxsecurity.com/content/view/154125
* Red Hat: 2011:0025-01: gcc: Low Advisory (Jan 13)
 -------------------------------------------------
 Updated gcc packages that fix two security issues and several
 compiler bugs are now available for Red Hat Enterprise Linux 5. The
 Red Hat Security Response Team has rated this update as having low
 [More...]
 http://www.linuxsecurity.com/content/view/154123
* Red Hat: 2011:0007-01: kernel: Important Advisory (Jan 11)
 ----------------------------------------------------------
 Updated kernel packages that fix multiple security issues and several
 bugs are now available for Red Hat Enterprise Linux 6. The Red Hat
 Security Response Team has rated this update as having [More...]
 http://www.linuxsecurity.com/content/view/154111
* Red Hat: 2011:0013-01: wireshark: Moderate Advisory (Jan 10)
 ------------------------------------------------------------
 Updated wireshark packages that fix one security issue are now
 available for Red Hat Enterprise Linux 4, 5, and 6. The Red Hat
 Security Response Team has rated this update as having moderate
 [More...]
 http://www.linuxsecurity.com/content/view/154102
------------------------------------------------------------------------
* Slackware: 2011-010-01: php: Security Update (Jan 10)
 -----------------------------------------------------
 New php packages are available for Slackware 11.0, 12.0, 12.1, 12.2,
 13.0, 13.1, and -current to fix a security issue. [More Info...]
 http://www.linuxsecurity.com/content/view/154105
------------------------------------------------------------------------
* SuSE: 2011-004: Linux kernel (Jan 14)
 -------------------------------------
 The SUSE Linux Enterprise 11 Service Pack 1 kernel was updated to
 2.6.32.27 and fixes various bugs and security issues. Following
 security issues were fixed: CVE-2010-4258: A local attacker could use
 a Oops (kernel crash) caused by other flaws to write a 0 byte to a
 attacker controlled address [More...]
 http://www.linuxsecurity.com/content/view/154140
* SuSE: Weekly Summary 2011:001 (Jan 11)
 --------------------------------------
 To avoid flooding mailing lists with SUSE Security Announcements for
 minor issues, SUSE Security releases weekly summary reports for the
 low profile vulnerability fixes. The SUSE Security Summary Reports do
 not list or download URLs like the SUSE Security Announcements that
 are released for more severe vulnerabilities. List of
 vulnerabilities in this summary include: finch/pidgin,
 libmoon-devel/moonlight-plugin, libsmi, openssl, perl-CGI-Simple,
 supportutils, wireshark.
 http://www.linuxsecurity.com/content/view/154106
------------------------------------------------------------------------
* Ubuntu: 1042-2: PHP5 regression (Jan 13)
 ----------------------------------------
 USN-1042-1 fixed vulnerabilities in PHP5. The fix for
 CVE-2010-3436introduced a regression in the open_basedir restriction
 handling code.This update fixes the problem. [More...]
 http://www.linuxsecurity.com/content/view/154124
* Ubuntu: 1043-1: Little CMS vulnerability (Jan 12)
 -------------------------------------------------
 It was discovered that a NULL pointer dereference in the code
 forhandling transformations of monochrome profiles could allow an
 attackerto cause a denial of service through a specially crafted
 image.(CVE-2009-0793) [More...]
 http://www.linuxsecurity.com/content/view/154114
* Ubuntu: 1009-2: GNU C Library vulnerability (Jan 12)
 ----------------------------------------------------
 USN-1009-1 fixed vulnerabilities in the GNU C library. Colin
 Watsondiscovered that the fixes were incomplete and introduced flaws
 withsetuid programs loading libraries that used dynamic string tokens
 in theirRPATH. If the "man" program was installed setuid, a local
 attacker couldexploit this to gain "man" user privileges, potentially
 leading to further [More...]
 http://www.linuxsecurity.com/content/view/154113
* Ubuntu: 1042-1: PHP vulnerabilities (Jan 11)
 --------------------------------------------
 It was discovered that an integer overflow in the XML UTF-8
 decodingcode could allow an attacker to bypass cross-site scripting
 (XSS)protections. This issue only affected Ubuntu 6.06 LTS, Ubuntu
 8.04 LTS,and Ubuntu 9.10. (CVE-2009-5016) [More...]
 http://www.linuxsecurity.com/content/view/154112
* Ubuntu: 1041-1: Linux kernel vulnerabilities (Jan 10)
 -----------------------------------------------------
 Dan Rosenberg discovered that the btrfs filesystem did not
 correctlyvalidate permissions when using the clone function. A local
 attacker couldoverwrite the contents of file handles that were opened
 for append-only,or potentially read arbitrary contents, leading to a
 loss of privacy. OnlyUbuntu 9.10 was affected. (CVE-2010-2537,
 CVE-2010-2538) [More...]
 http://www.linuxsecurity.com/content/view/154103
------------------------------------------------------------------------
Distributed by: Guardian Digital, Inc. LinuxSecurity.com
 To unsubscribe email vuln-newsletter-request@xxxxxxxxxxxxxxxxx
 with "unsubscribe" in the subject of the message.
------------------------------------------------------------------------

[Index of Archives] [Fedora Announce] [Linux Crypto] [Kernel] [Netfilter] [Bugtraq] [USB] [Fedora Security]

(追記) (追記ここまで)
Powered by Linux

AltStyle によって変換されたページ (->オリジナル) /