LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Advisory Watch: September 26th, 2014
Linux Security Week: September 22nd, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Linux Advisory Watch: January 31st, 2014 Print E-mail
User Rating:      How can I rate this item?
Source: LinuxSecurity Contributors - Posted by Benjamin D. Thomas   
Linux Advisory Watch Thank you for reading the Linux Advisory Watch Security Newsletter. The purpose of this document is to provide our readers with a quick summary of each week's vendor security bulletins and pointers on methods to improve the security posture of your open source system. Vulnerabilities affect nearly every vendor virtually every week, so be sure to read through to find the updates your distributor have made available.

LinuxSecurity.com Feature Extras:

Peter Smith Releases Linux Network Security Online - Thanks so much to Peter Smith for announcing on linuxsecurity.com the release of his Linux Network Security book available free online. In 2005 I wrote a book on Linux security. 8 years later and the publisher has gone out of business. Now that I'm free from restrictions on reproducing material from the book, I have decided to make the entire book available online.

Securing a Linux Web Server - With the significant prevalence of Linux web servers globally, security is often touted as a strength of the platform for such a purpose. However, a Linux based web server is only as secure as its configuration and very often many are quite vulnerable to compromise. While specific configurations vary wildly due to environments or specific use, there are various general steps that can be taken to insure basic security considerations are in place.


  Debian: 2849-1: curl: information disclosure (Jan 31)
 

Paras Sethia discovered that libcurl, a client-side URL transfer library, would sometimes mix up multiple HTTP and HTTPS connections with NTLM authentication to the same server, sending requests for one user over the connection authenticated as a different user. [More...]

  Debian: 2826-2: denyhosts: regression (Jan 23)
 

A regression has been found on the denyhosts packages fixing CVE-2013-6890. This regression could cause an attempted breakin attempt to be missed by denyhosts, which would then fail to enforce a ban. [More...]

  Debian: 2848-1: mysql-5.5: Multiple vulnerabilities (Jan 23)
 

Several issues have been discovered in the MySQL database server. The vulnerabilities are addressed by upgrading MySQL to the new upstream version 5.5.35. Please see the MySQL 5.5 Release Notes and Oracle's Critical Patch Update advisory for further details: [More...]


  Gentoo: 201401-34 BIND: Denial of Service (Jan 29)
 

Multiple vulnerabilities have been found in BIND, possibly resulting in Denial of Service.

  Gentoo: 201401-33 Perl Digest-Base module: Arbitrary code execution (Jan 29)
 

A vulnerability has been found in the Digest-Base Perl module, allowing remote attackers to execute arbitrary code.

  Gentoo: 201401-32 Exim: Multiple vulnerabilities (Jan 27)
 

Multiple vulnerabilities were found in Exim, the worst of which leading to remote execution of arbitrary code with root privileges.

  Gentoo: 201401-31 CEDET: Privilege escalation (Jan 27)
 

A vulnerability in CEDET could result in privilege escalation.

  Gentoo: 201401-30 Oracle JRE/JDK: Multiple vulnerabilities (Jan 26)
 

Multiple vulnerabilities have been found in the Oracle JRE/JDK, allowing attackers to cause unspecified impact.

  Gentoo: 201401-29 VIPS: Privilege Escalation (Jan 26)
 

A vulnerability in VIPS could result in privilege escalation.

  Gentoo: 201401-28 Tomboy: Privilege escalation (Jan 25)
 

A vulnerability in Tomboy could result in privilege escalation.

  Gentoo: 201401-27 GNU TeXmacs: Privilege escalation (Jan 25)
 

A vulnerability in GNU TeXmacs could result in privilege escalation.

  Gentoo: 201401-26 Zabbix: Shell command injection (Jan 23)
 

A vulnerability in Zabbix could allow remote attackers to execute arbitrary shell code.


  Mandriva: 2014:024: graphviz (Jan 24)
 

Updated graphviz packages fix security vulnerabilities: Multiple buffer overflow vulnerabilities in graphviz due to an error within the yyerror() function (lib/cgraph/scan.l) which can be exploited to cause a stack-based buffer overflow via a specially [More...]

  Mandriva: 2014:023: hplip (Jan 24)
 

Updated hplip packages fix security vulnerabilities: It was discovered that the HPLIP Polkit daemon incorrectly handled temporary files. A local attacker could possibly use this issue to overwrite arbitrary files (CVE-2013-6402). [More...]

  Mandriva: 2014:022: augeas (Jan 24)
 

Updated augeas packages fix security vulnerabilities: Multiple flaws were found in the way Augeas handled configuration files when updating them. An application using Augeas to update configuration files in a directory that is writable to by a different user (for [More...]

  Mandriva: 2014:021: perl-Proc-Daemon (Jan 24)
 

Updated perl-Proc-Daemon package fixes security vulnerability: It was reported that perl-Proc-Daemon, when instructed to write a pid file, does that with a umask set to 0, so the pid file ends up with mode 666, allowing any user on the system to overwrite it [More...]


  Red Hat: 2014:0113-01: openstack-keystone: Moderate Advisory (Jan 30)
 

Updated openstack-keystone packages that fix one security issue are now available for Red Hat Enterprise Linux OpenStack Platform 3.0. The Red Hat Security Response Team has rated this update as having moderate [More...]

  Red Hat: 2014:0112-01: openstack-nova: Moderate Advisory (Jan 30)
 

Updated openstack-nova packages that fix two security issues and three bugs are now available for Red Hat Enterprise Linux OpenStack Platform 3.0. The Red Hat Security Response Team has rated this update as having moderate [More...]

  Red Hat: 2014:0108-01: kernel: Moderate Advisory (Jan 29)
 

Updated kernel packages that fix one security issue and three bugs are now available for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having moderate [More...]

  Red Hat: 2014:0103-01: libvirt: Moderate Advisory (Jan 28)
 

Updated libvirt packages that fix two security issues and one bug are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having moderate [More...]

  Red Hat: 2014:0100-01: kernel-rt: Important Advisory (Jan 28)
 

Updated kernel-rt packages that fix multiple security issues and several bugs are now available for Red Hat Enterprise MRG 2.4. The Red Hat Security Response Team has rated this update as having [More...]

  Red Hat: 2014:0097-01: java-1.6.0-openjdk: Important Advisory (Jan 27)
 

Updated java-1.6.0-openjdk packages that fix various security issues are now available for Red Hat Enterprise Linux 5 and 6. The Red Hat Security Response Team has rated this update as having [More...]


  Slackware: 2014-028-01: bind: Security Update (Jan 28)
 

New bind packages are available for Slackware 13.0, 13.1, 13.37, 14.0, 14.1, and -current to fix a security issue. [More Info...]

  Slackware: 2014-028-02: mozilla-nss: Security Update (Jan 28)
 

New mozilla-nss packages are available for Slackware 14.0, 14.1, and -current to fix a security issue. [More Info...]


  Ubuntu: 2094-1: Linux kernel (Raring HWE) vulnerability (Jan 31)
 

The system could be made to crash or run programs as an administrator.

  Ubuntu: 2095-1: Linux kernel (Saucy HWE) vulnerability (Jan 31)
 

The system could be made to crash or run programs as an administrator.

  Ubuntu: 2096-1: Linux kernel vulnerability (Jan 31)
 

The system could be made to crash or run programs as an administrator.

  Ubuntu: 2092-1: QEMU vulnerabilities (Jan 30)
 

Several security issues were fixed in QEMU.

  Ubuntu: 2093-1: libvirt vulnerabilities (Jan 30)
 

Several security issues were fixed in libvirt.

  Ubuntu: 2091-1: OTR vulnerabilities (Jan 30)
 

Applications using the OTR secure chat protocol could be made to exposesensitive information over the network.

  Ubuntu: 2090-1: Munin vulnerabilities (Jan 27)
 

Several security issues were fixed in Munin.

  Ubuntu: 2089-1: openjdk-7 vulnerabilities (Jan 23)
 

Several security issues were fixed in OpenJDK 7.

  Ubuntu: 2088-1: NSS vulnerability (Jan 23)
 

NSS could be made to expose sensitive information over the network.

  Ubuntu: 2087-1: NSPR vulnerability (Jan 23)
 

NSPR could be made to crash or run programs if it received a speciallycrafted certificate.

Only registered users can write comments.
Please login or register.

Powered by AkoComment!

 
< Prev   Next >
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.