Red Hat has released a kerberos security update for Red Hat Linux 6.2 - 8.0
A new security update for Debian GNU/Linux is available
DSA-247-1 courier-ssl -- missing input sanitizing
DSA-247-1 courier-ssl -- missing input sanitizing
The developers of courier, an integrated user side mail server, discovered a problem in the PostgreSQL auth module. Not all potentially malicious characters were sanitized before the username was passed to the PostgreSQL engine. An attacker could inject arbitrary SQL commands and queries exploiting this vulnerability. The MySQL auth module is not affected.Read more
A new Tomcat update for Debian GNU/Linux is available
MandrakeSoft has released two security updates for Mandrake Linux:
- MDKSA-2003:011 - fetchmail
- MDKA-2003:002 - msec
- MDKSA-2003:011 - fetchmail
- MDKA-2003:002 - msec
Linux-based APIs are on the roadmap of various vendors in support of the Trusted Computing Platform Alliance's (TCPA'S) security initiative, an Infineon Technologies official said at the Platform Conference here on Tuesday.
Read more
Read more
Two new security updates for Debian GNU/Linux has been released
DSA-245-1 dhcp3 -- ignored counter boundary
DSA-245-1 dhcp3 -- ignored counter boundary
An Util-linux update for the Sun Cobalt RaQ 3/4 server appliances has been released
New security fixes for KDE under Debian GNU/Linux has been released:
DSA-241 kdeutils - several
DSA-240 kdegames - several
DSA-239 kdesdk - several
DSA-238 kdepim - several
DSA-237 kdenetwork - several
DSA-241 kdeutils - several
DSA-240 kdegames - several
DSA-239 kdesdk - several
DSA-238 kdepim - several
DSA-237 kdenetwork - several
4 new security updates are available for Debian GNU/Linux:
- DSA-236 kdelibs - several
- DSA-235 kdegraphics - several
- DSA-234 kdeadmin - several
- DSA-233 cvs - doubly freed memory
- DSA-236 kdelibs - several
- DSA-235 kdegraphics - several
- DSA-234 kdeadmin - several
- DSA-233 cvs - doubly freed memory
Red Hat has released updated Python packages for Red Hat Linux 6.2 - 7.3
Red Hat has released a cvs package update for Red Hat Linux 6.2 - 8.0
A cvs package secuity update for Gentoo Linux has been released:
By sending a malformed directory name it is possible to trigger an error condition that will make the function return at a point where a global pointer variable is already freed and has not got a new value assigned yet. This will result in a classical double-free() when the next Directory request is handled. With the help of other CVS requests it is possible to either leak some information that could be used to determine the heap position or to execute arbitrary code on systems that are known to be vulnerable to this kind of bugs.
SOLUTION
It is recommended that all Gentoo Linux users who are running dev-util/cvs upgrade to cvs-1.11.5 as follows:
emerge sync
emerge -u cvs
emerge clean
By sending a malformed directory name it is possible to trigger an error condition that will make the function return at a point where a global pointer variable is already freed and has not got a new value assigned yet. This will result in a classical double-free() when the next Directory request is handled. With the help of other CVS requests it is possible to either leak some information that could be used to determine the heap position or to execute arbitrary code on systems that are known to be vulnerable to this kind of bugs.
SOLUTION
It is recommended that all Gentoo Linux users who are running dev-util/cvs upgrade to cvs-1.11.5 as follows:
emerge sync
emerge -u cvs
emerge clean
SuSE AG has released two security updates for their Linux distribution
Package: dhcp
Package: dhcp
MandrakeSoft has released two new security updates for Mandrake Linux
MDKSA-2003:008 : libpng
MDKSA-2003:008 : libpng
A new security update for Debian GNU/Linux has been released:
DSA-232-1 cupsys -- several
DSA-232-1 cupsys -- several
Three new security updates for Gentoo Linux are available:
PACKAGE : fnord
fnord 1.6 contained a buffer overrun in the CGI code. However, since the function does not return, this does not appear to be exploitable
Read more
PACKAGE : dhcp
The Internet Software Consortium (ISC) has discovered several buffer overflow vulnerabilities in their implementation of DHCP (ISC DHCPD). These vulnerabilities may allow remote attackers to execute arbitrary code on affected systems. At this time, we are not aware of any exploits.
Read more
PACKAGE : kde-2.2.x
In some instances KDE fails to properly quote parameters of instructions passed to a command shell for execution.
These parameters may incorporate data such as URLs, filenames and e-mail addresses, and this data may be provided remotely to a victim in an e-mail, a webpage or files on a network filesystem or other untrusted source.
Read more
PACKAGE : fnord
fnord 1.6 contained a buffer overrun in the CGI code. However, since the function does not return, this does not appear to be exploitable
Read more
PACKAGE : dhcp
The Internet Software Consortium (ISC) has discovered several buffer overflow vulnerabilities in their implementation of DHCP (ISC DHCPD). These vulnerabilities may allow remote attackers to execute arbitrary code on affected systems. At this time, we are not aware of any exploits.
Read more
PACKAGE : kde-2.2.x
In some instances KDE fails to properly quote parameters of instructions passed to a command shell for execution.
These parameters may incorporate data such as URLs, filenames and e-mail addresses, and this data may be provided remotely to a victim in an e-mail, a webpage or files on a network filesystem or other untrusted source.
Read more
MandrakeSoft has released the follow security updates for Mandrake Linux:
MDKSA-2003:007 : dhcp
Several potential vulnerabilities were detected by the ISC (Internet Software Consortium) in their dhcp server software. The vulnerabilities affect the minires library and may be exploitable as stack buffer overflows, which could lead to remote code execution. All Mandrake Linux users are encouraged to upgrade; only Mandrake Linux 8.0 came with dhcp 2.x and is not vulnerable.
Read more
MDKSA-2003:004-1 : kde
Multiple instances of improperly quoted shell command execution exist in KDE 2.x up to and including KDE 3.0.5. KDE fails to properly quote parameters of instructions passed to the shell for execution. These parameters may contain data such as filenames, URLs, email address, and so forth; this data may be provided remotely to a victim via email, web pages, files on a network filesystem, or other untrusted sources.
Read more
MDKSA-2003:007 : dhcp
Several potential vulnerabilities were detected by the ISC (Internet Software Consortium) in their dhcp server software. The vulnerabilities affect the minires library and may be exploitable as stack buffer overflows, which could lead to remote code execution. All Mandrake Linux users are encouraged to upgrade; only Mandrake Linux 8.0 came with dhcp 2.x and is not vulnerable.
Read more
MDKSA-2003:004-1 : kde
Multiple instances of improperly quoted shell command execution exist in KDE 2.x up to and including KDE 3.0.5. KDE fails to properly quote parameters of instructions passed to the shell for execution. These parameters may contain data such as filenames, URLs, email address, and so forth; this data may be provided remotely to a victim via email, web pages, files on a network filesystem, or other untrusted sources.
Read more
Two new security updates for Debian GNU/Linux has been released:
DSA-231-1 dhcp3 -- stack overflows
The Internet Software Consortium discoverd several vulnerabilities during an audit of the ISC DHCP Daemon. The vulnerabilities exist in error handling routines within the minires library and may be exploitable as stack overflows. This could allow a remote attacker to execute arbitrary code under the user id the dhcpd runs under, usually root. Other DHCP servers than dhcp3 doesn't seem to be affected.
Read more
DSA-230-1 bugzilla -- insecure permissions, spurious backup files
Two vulnerabilities have been discovered in Bugzilla, a web-based bug tracking system, by its authors.
Read more
DSA-231-1 dhcp3 -- stack overflows
The Internet Software Consortium discoverd several vulnerabilities during an audit of the ISC DHCP Daemon. The vulnerabilities exist in error handling routines within the minires library and may be exploitable as stack overflows. This could allow a remote attacker to execute arbitrary code under the user id the dhcpd runs under, usually root. Other DHCP servers than dhcp3 doesn't seem to be affected.
Read more
DSA-230-1 bugzilla -- insecure permissions, spurious backup files
Two vulnerabilities have been discovered in Bugzilla, a web-based bug tracking system, by its authors.
Read more
SuSE has released a libpng update for SuSE Linux
Red Hat has released an updated VIM package for Red Hat Linux 6.2 - 8.0