Thank you for reading the Linux Advisory Watch Security Newsletter. The purpose of this document is to provide our readers with a quick summary of each week's vendor security bulletins and pointers on methods to improve the security posture of your open source system. Vulnerabilities affect nearly every vendor virtually every week, so be sure to read through to find the updates your distributor have made available.

LinuxSecurity.com Feature Extras:

Password guessing with Medusa 2.0 - Medusa was created by the fine folks at foofus.net, in fact the much awaited Medusa 2.0 update was released in February of 2010. For a complete change log please visit

Password guessing as an attack vector - Using password guessing as an attack vector. Over the years we've been taught a strong password must be long and complex to be considered secure. Some of us have taken that notion to heart and always ensure our passwords are strong. But some don't give a second thought to the complexity or length of our password.


(Feb 14)

Kevin Cernekee discovered that a malicious VPN gateway can send crafted responses which trigger stack-based buffer overflows. For the stable distribution (squeeze), this problem has been fixed in [More...]

(Feb 13)

Multiple vulnerabilities have been found in OpenSSL. The Common Vulnerabilities and Exposures project identifies the following issues: CVE-2013-0169 [More...]

(Feb 13)

Multiple vulnerabilities have been found in OpenSSL. The Common Vulnerabilities and Exposures project identifies the following issues: CVE-2013-0166 [More...]

(Feb 12)

Two vulnerabilities were discovered in Ruby on Rails, a Ruby framework for web application development. CVE-2013-0276 [More...]

(Feb 10)

This update to the previous ircd-ratbox DSA only raises the version number to ensure that a higher version is used than a previously binNMU on some architectures. [More...]

(Feb 10)

A buffer overflow was found in the e1000e emulation, which could be triggered when processing jumbo frames. For the stable distribution (squeeze), this problem has been fixed in [More...]

(Feb 7)

Bob Nomnomnom reported a Denial of Service vulnerability in IRCD-Hybrid, an Internet Relay Chat server. A remote attacker may use an error in the masks validation and crash the server. [More...]


Mandriva: 2013:011: samba (Feb 13)

Multiple vulnerabilities has been found and corrected in samba (swat): The Samba Web Administration Tool (SWAT) in Samba 3.x before 3.5.21, 3.6.x before 3.6.12, and 4.x before 4.0.2 allows remote attackers to conduct clickjacking attacks via a (1) FRAME or (2) IFRAME element [More...]

Mandriva: 2013:010: java-1.6.0-openjdk (Feb 11)

Multiple security issues were identified and fixed in OpenJDK (icedtea6): * S6563318, CVE-2013-0424: RMI data sanitization * S6664509, CVE-2013-0425: Add logging context [More...]

Mandriva: 2013:009: libssh (Feb 9)

A vulnerability has been found and corrected in libssh: The publickey_from_privatekey function in libssh before 0.5.4, when no algorithm is matched during negotiations, allows remote attackers to cause a denial of service (NULL pointer dereference and crash) [More...]


Red Hat: 2013:0254-01: flash-plugin: Critical Advisory (Feb 13)

An updated Adobe Flash Player package that fixes several security issues is now available for Red Hat Enterprise Linux 5 and 6 Supplementary. The Red Hat Security Response Team has rated this update as having critical [More...]

Red Hat: 2013:0253-01: openstack-keystone: Moderate Advisory (Feb 12)

Updated openstack-keystone packages that fix one security issue and two bugs are now available for Red Hat OpenStack Folsom. The Red Hat Security Response Team has rated this update as having moderate [More...]

Red Hat: 2013:0250-01: elinks: Moderate Advisory (Feb 11)

An updated elinks package that fixes one security issue is now available for Red Hat Enterprise Linux 5 and 6. The Red Hat Security Response Team has rated this update as having moderate [More...]

Red Hat: 2013:0247-01: java-1.7.0-openjdk: Important Advisory (Feb 8)

Updated java-1.7.0-openjdk packages that fix several security issues are now available for Red Hat Enterprise Linux 5 and 6. The Red Hat Security Response Team has rated this update as having [More...]

Red Hat: 2013:0246-01: java-1.6.0-openjdk: Important Advisory (Feb 8)

Updated java-1.6.0-openjdk packages that fix several security issues are now available for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having [More...]

Red Hat: 2013:0245-01: java-1.6.0-openjdk: Critical Advisory (Feb 8)

Updated java-1.6.0-openjdk packages that fix several security issues are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having critical [More...]

Red Hat: 2013:0243-01: flash-plugin: Critical Advisory (Feb 8)

An updated Adobe Flash Player package that fixes two security issues is now available for Red Hat Enterprise Linux 5 and 6 Supplementary. The Red Hat Security Response Team has rated this update as having critical [More...]

Red Hat: 2013:0241-01: xen: Moderate Advisory (Feb 7)

Updated xen packages that fix one security issue are now available for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having moderate [More...]


(Feb 14)

New pidgin packages are available for Slackware 12.2, 13.0, 13.1, 13.37, 14.0, and -current to fix security issues. [More Info...]

(Feb 12)

New openssl packages are available for Slackware 14.0, and -current to fix a bug in openssl-1.0.1d. [More Info...]

(Feb 10)

New openssl packages are available for Slackware 12.1, 12.2, 13.0, 13.1, 13.37, 14.0, and -current to fix security issues. [More Info...]

(Feb 9)

New openssl packages are available for Slackware 12.1, 12.2, 13.0, 13.1, 13.37, 14.0, and -current to fix security issues. [More Info...]

(Feb 8)

New curl packages are available for Slackware 14.0, and -current to fix a security issue. [More Info...]


Ubuntu: 1726-1: Linux kernel (OMAP4) vulnerabilities (Feb 14)

Several security issues were fixed in the kernel.

Ubuntu: 1725-1: Linux kernel vulnerability (Feb 14)

The system could be made to crash under certain conditions.

Ubuntu: 1724-1: OpenJDK vulnerabilities (Feb 14)

Several security issues were fixed in OpenJDK.

Ubuntu: 1723-1: Qt vulnerabilities (Feb 14)

Several security issues were fixed in Qt.

Ubuntu: 1722-1: jQuery vulnerability (Feb 13)

jQuery could be made to expose sensitive information over the network.

Ubuntu: 1721-1: curl vulnerability (Feb 12)

curl could be made to crash or run programs if it opened a malicious URL.

Ubuntu: 1720-1: Linux kernel vulnerabilities (Feb 12)

Several security issues were fixed in the kernel.

Ubuntu: 1719-1: Linux kernel (Oneiric backport) vulnerabilities (Feb 12)

Several security issues were fixed in the kernel.

Ubuntu: 1716-1: gnome-screensaver vulnerability (Feb 12)

gnome-screensaver would allow unintended access to the user session.

Ubuntu: 1717-1: PostgreSQL vulnerability (Feb 12)

PostgreSQL could be made to crash if it received specially crafted input.