Thank you for reading the Linux Advisory Watch Security Newsletter. The purpose of this document is to provide our readers with a quick summary of each week's vendor security bulletins and pointers on methods to improve the security posture of your open source system. Vulnerabilities affect nearly every vendor virtually every week, so be sure to read through to find the updates your distributor have made available.

LinuxSecurity.com Feature Extras:

sec-wall: Open Source Security Proxy - sec-wall, a recently released security proxy is a one-stop place for everything related to securing HTTP/HTTPS traffic. Designed as a pragmatic solution to the question of securing servers using SSL/TLS certificates, WS-Security, HTTP Basic/Digest Auth, custom HTTP headers, XPath expressions with an option of modifying HTTP headers and URLs on the fly.

Book Review: Linux Kernel Programming - As Linux is implemented on increasingly wider number of devices, the number of people responsible for developing and maintaining Linux on those platforms have increased. As the level of maturity of the kernel increases, so does the complexity, capabilities, and size. This book provides the Linux programmer the tools necessary to understand the core aspects of the kernel and how to interface with it.


Guardian Digital is happy to announce the release of EnGarde Secure Community 3.0.22 (Version 3.0, Release 22). This release includes many updated packages and bug fixes and some feature enhancements to the EnGarde Secure Linux Installer and the SELinux policy.


(Jun 2)

It was discovered that the message header parser in the Dovecot mail server parsed NUL characters incorrectly, which could lead to denial of service through malformed mail headers. [More...]

(Jun 2)

Several vulnerabilities were discovered in Subversion, the version control system. The Common Vulnerabilities and Exposures project identifies the following problems: [More...]

(May 31)

Wouter Coekaerts discovered that the jabber server component of citadel, a complete and feature-rich groupware server, is vulnerable to the so-called "billion laughs" attack because it does not prevent entity expansion on received data. This allows an attacker to perform denial of service [More...]

(May 31)

Wouter Coekaerts discovered that jabberd14, an instant messaging server using the Jabber/XMPP protocol, is vulnerable to the so-called "billion laughs" attack because it does not prevent entity expansion on received data. This allows an attacker to perform denial of service [More...]

(May 31)

Wouter Coekaerts discovered that ejabberd, a distributed XMPP/Jabber server written in Erlang, is vulnerable to the so-called "billion laughs" attack because it does not prevent entity expansion on received data. This allows an attacker to perform denial of service attacks against the [More...]

(May 31)

Several vulnerabilities have been discovered in Rails, the Ruby web application framework. The Common Vulnerabilities and Exposures project identifies the following problems: [More...]

(May 29)

Several vulnerabilities were discovered in mahara, an electronic portfolio, weblog, and resume builder. The following Common Vulnerabilities and Exposures project ids identify them: [More...]

(May 29)

Several vulnerabilities were discovered in the Chromium browser. The Common Vulnerabilities and Exposures project identifies the following problems: [More...]

(May 27)

It was discovered that BIND, an implementation of the DNS protocol, does not correctly process certain large RRSIG record sets in DNSSEC responses. The resulting assertion failure causes the name server process to crash, making name resolution unavailable. (CVE-2011-1910) [More...]

(May 27)

It was discovered that Unbound, a caching DNS resolver, ceases to provide answers for zones signed using DNSSEC after it has processed a crafted query. (CVE-2009-4008) [More...]


Mandriva: 2011:105: wireshark (Jun 1)

This advisory updates wireshark to the latest version (1.2.17), fixing several security issues: * Large/infinite loop in the DICOM dissector. (Bug 5876) Versions affected: 1.2.0 to 1.2.16 and 1.4.0 to 1.4.6. [More...]

Mandriva: 2011:104: bind (Jun 1)

A vulnerability has been identified and fixed in ISC BIND: Off-by-one error in named in ISC BIND 9.x before 9.7.3-P1, 9.8.x before 9.8.0-P2, 9.4-ESV before 9.4-ESV-R4-P1, and 9.6-ESV before 9.6-ESV-R4-P1 allows remote DNS servers to cause a denial of service [More...]

Mandriva: 2011:103: gimp (May 29)

Multiple vulnerabilities was discovered and fixed in gimp: Stack-based buffer overflow in the "LIGHTING EFFECTS > LIGHT" plugin in GIMP 2.6.11 allows user-assisted remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code [More...]

Mandriva: 2011:102: rdesktop (May 28)

A vulnerability has been identified and fixed in rdesktop: Directory traversal vulnerability in the disk_create function in disk.c in rdesktop before 1.7.0, when disk redirection is enabled, allows remote RDP servers to read or overwrite arbitrary files via [More...]

Mandriva: 2011:101: dovecot (May 26)

A vulnerability has been identified and fixed in dovecot: lib-mail/message-header-parser.c in Dovecot 1.2.x before 1.2.17 and 2.0.x before 2.0.13 does not properly handle '\0' (NUL) characters in header names, which allows remote attackers to cause a denial of [More...]


Red Hat: 2011:0836-01: kernel: Important Advisory (Jun 1)

Updated kernel packages that fix multiple security issues and various bugs are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having [More...]

Red Hat: 2011:0841-01: systemtap: Moderate Advisory (May 31)

Updated systemtap packages that fix one security issue are now available for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having moderate [More...]

Red Hat: 2011:0843-01: postfix: Moderate Advisory (May 31)

Updated postfix packages that fix one security issue are now available for Red Hat Enterprise Linux 4, 5, and 6. The Red Hat Security Response Team has rated this update as having moderate [More...]

Red Hat: 2011:0844-01: apr: Low Advisory (May 31)

Updated apr packages that fix one security issue are now available for Red Hat Enterprise Linux 4, 5, and 6. The Red Hat Security Response Team has rated this update as having low [More...]

Red Hat: 2011:0845-01: bind: Important Advisory (May 31)

Updated bind and bind97 packages that fix one security issue are now available for Red Hat Enterprise Linux 5 and 6. The Red Hat Security Response Team has rated this update as having [More...]

Red Hat: 2011:0838-01: gimp: Moderate Advisory (May 31)

Updated gimp packages that fix multiple security issues are now available for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having moderate [More...]

Red Hat: 2011:0842-01: systemtap: Moderate Advisory (May 31)

Updated systemtap packages that fix two security issues are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having moderate [More...]

Red Hat: 2011:0840-01: dhcp: Important Advisory (May 31)

Updated dhcp packages that fix one security issue are now available for Red Hat Enterprise Linux 3 Extended Life Cycle Support. The Red Hat Security Response Team has rated this update as having [More...]

Red Hat: 2011:0837-01: gimp: Moderate Advisory (May 31)

Updated gimp packages that fix multiple security issues are now available for Red Hat Enterprise Linux 4. The Red Hat Security Response Team has rated this update as having moderate [More...]

Red Hat: 2011:0833-01: kernel: Important Advisory (May 31)

Updated kernel packages that fix multiple security issues and several bugs are now available for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having [More...]

Red Hat: 2011:0839-01: gimp: Moderate Advisory (May 31)

Updated gimp packages that fix multiple security issues are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having moderate [More...]


(May 27)

New bind packages are available for Slackware 8.1, 9.0, 9.1, 10.0, 10.1, 10.2, 11.0, 12.0, 12.1, 12.2, 13.0, 13.1, 13.37, and -current to fix security issues. [More Info...]


SuSE: Weekly Summary 2011:010 (May 31)

To avoid flooding mailing lists with SUSE Security Announcements for minor issues, SUSE Security releases weekly summary reports for the low profile vulnerability fixes. The SUSE Security Summary Reports do not list or download URLs like the SUSE Security Announcements that are released for more severe vulnerabilities. List of vulnerabilities in this summary include: postfix, libthunarx-2-0, rdesktop, python, viewvc, kvm, exim, logrotate, dovecot12/dovecot20, pure-ftpd, kdelibs4.


Ubuntu: 1143-1: Dovecot vulnerability (Jun 1)

An attacker could send a crafted email message that could disrupt emailservice.

Ubuntu: 1142-1: GDM vulnerability (Jun 1)

GDM could be made to launch a browser and leak information about the system.

Ubuntu: 1141-1: Linux kernel vulnerabilities (May 31)

Multiple kernel vulnerabilities have been fixed.

Ubuntu: 1139-1: Bind vulnerabilities (May 30)

An attacker could send crafted input to Bind and cause it to crash.

Ubuntu: 1138-2: NetworkManager and ModemManager update (May 26)

An attacker could send crafted input to NetworkManager and ModemManagerand cause them to crash.

Ubuntu: 1138-1: DBus-GLib vulnerability (May 26)

An attacker could send crafted input to applications using DBus-GLib andcause them to crash.

Ubuntu: 1137-1: Eucalyptus vulnerability (May 26)

An attacker could send crafted input to Eucalyptus to run commands asa valid user.


Pardus: 2011-80: kdenetwork: Directory traversal (May 26)

A vuolnerability has been fixed in kdenetwork, which can be exploited by attackers to create arbitrary files.

Pardus: 2011-79: kdelibs: MITM Attack (May 26)

A vulnerability has been fixed in kdelibs,which can be exploited by malicious people to man-in-the-middle attack.

Pardus: 2011-78: dhcpcd: Execute Arbitrary Commands (May 26)

A vulnerability has been fixed in dhcpcd, which allows attackers to execute arbitrary commands.

Pardus: 2011-76: openldap: Multiple Vulnerabilities (May 26)

Multiple vulnerabilities have been fixed in openldap.

Pardus: 2011-77: Wireshark: Multiple Vulnerabilities (May 26)

Multible vulnerabilities have been fixed in wireshark, which allow attackers to cause a denial of service or to execute arbitrary code.