Thank you for reading the Linux Advisory Watch Security Newsletter. The purpose of this document is to provide our readers with a quick summary of each week's vendor security bulletins and pointers on methods to improve the security posture of your open source system. Vulnerabilities affect nearly every vendor virtually every week, so be sure to read through to find the updates your distributor have made available.

LinuxSecurity.com Feature Extras:

Peter Smith Releases Linux Network Security Online - Thanks so much to Peter Smith for announcing on linuxsecurity.com the release of his Linux Network Security book available free online. In 2005 I wrote a book on Linux security. 8 years later and the publisher has gone out of business. Now that I'm free from restrictions on reproducing material from the book, I have decided to make the entire book available online.

Securing a Linux Web Server - With the significant prevalence of Linux web servers globally, security is often touted as a strength of the platform for such a purpose. However, a Linux based web server is only as secure as its configuration and very often many are quite vulnerable to compromise. While specific configurations vary wildly due to environments or specific use, there are various general steps that can be taken to insure basic security considerations are in place.


(Jan 31)

Paras Sethia discovered that libcurl, a client-side URL transfer library, would sometimes mix up multiple HTTP and HTTPS connections with NTLM authentication to the same server, sending requests for one user over the connection authenticated as a different user. [More...]

Debian: 2826-2: denyhosts: regression (Jan 23)

A regression has been found on the denyhosts packages fixing CVE-2013-6890. This regression could cause an attempted breakin attempt to be missed by denyhosts, which would then fail to enforce a ban. [More...]

(Jan 23)

Several issues have been discovered in the MySQL database server. The vulnerabilities are addressed by upgrading MySQL to the new upstream version 5.5.35. Please see the MySQL 5.5 Release Notes and Oracle's Critical Patch Update advisory for further details: [More...]


(Jan 29)

Multiple vulnerabilities have been found in BIND, possibly resulting in Denial of Service.

(Jan 29)

A vulnerability has been found in the Digest-Base Perl module, allowing remote attackers to execute arbitrary code.

(Jan 27)

Multiple vulnerabilities were found in Exim, the worst of which leading to remote execution of arbitrary code with root privileges.

(Jan 27)

A vulnerability in CEDET could result in privilege escalation.

(Jan 26)

Multiple vulnerabilities have been found in the Oracle JRE/JDK, allowing attackers to cause unspecified impact.

(Jan 26)

A vulnerability in VIPS could result in privilege escalation.

(Jan 25)

A vulnerability in Tomboy could result in privilege escalation.

(Jan 25)

A vulnerability in GNU TeXmacs could result in privilege escalation.

(Jan 23)

A vulnerability in Zabbix could allow remote attackers to execute arbitrary shell code.


Mandriva: 2014:024: graphviz (Jan 24)

Updated graphviz packages fix security vulnerabilities: Multiple buffer overflow vulnerabilities in graphviz due to an error within the yyerror() function (lib/cgraph/scan.l) which can be exploited to cause a stack-based buffer overflow via a specially [More...]

Mandriva: 2014:023: hplip (Jan 24)

Updated hplip packages fix security vulnerabilities: It was discovered that the HPLIP Polkit daemon incorrectly handled temporary files. A local attacker could possibly use this issue to overwrite arbitrary files (CVE-2013-6402). [More...]

Mandriva: 2014:022: augeas (Jan 24)

Updated augeas packages fix security vulnerabilities: Multiple flaws were found in the way Augeas handled configuration files when updating them. An application using Augeas to update configuration files in a directory that is writable to by a different user (for [More...]

Mandriva: 2014:021: perl-Proc-Daemon (Jan 24)

Updated perl-Proc-Daemon package fixes security vulnerability: It was reported that perl-Proc-Daemon, when instructed to write a pid file, does that with a umask set to 0, so the pid file ends up with mode 666, allowing any user on the system to overwrite it [More...]


Red Hat: 2014:0113-01: openstack-keystone: Moderate Advisory (Jan 30)

Updated openstack-keystone packages that fix one security issue are now available for Red Hat Enterprise Linux OpenStack Platform 3.0. The Red Hat Security Response Team has rated this update as having moderate [More...]

Red Hat: 2014:0112-01: openstack-nova: Moderate Advisory (Jan 30)

Updated openstack-nova packages that fix two security issues and three bugs are now available for Red Hat Enterprise Linux OpenStack Platform 3.0. The Red Hat Security Response Team has rated this update as having moderate [More...]

Red Hat: 2014:0108-01: kernel: Moderate Advisory (Jan 29)

Updated kernel packages that fix one security issue and three bugs are now available for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having moderate [More...]

Red Hat: 2014:0103-01: libvirt: Moderate Advisory (Jan 28)

Updated libvirt packages that fix two security issues and one bug are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having moderate [More...]

Red Hat: 2014:0100-01: kernel-rt: Important Advisory (Jan 28)

Updated kernel-rt packages that fix multiple security issues and several bugs are now available for Red Hat Enterprise MRG 2.4. The Red Hat Security Response Team has rated this update as having [More...]

Red Hat: 2014:0097-01: java-1.6.0-openjdk: Important Advisory (Jan 27)

Updated java-1.6.0-openjdk packages that fix various security issues are now available for Red Hat Enterprise Linux 5 and 6. The Red Hat Security Response Team has rated this update as having [More...]


(Jan 28)

New bind packages are available for Slackware 13.0, 13.1, 13.37, 14.0, 14.1, and -current to fix a security issue. [More Info...]

(Jan 28)

New mozilla-nss packages are available for Slackware 14.0, 14.1, and -current to fix a security issue. [More Info...]


Ubuntu: 2094-1: Linux kernel (Raring HWE) vulnerability (Jan 31)

The system could be made to crash or run programs as an administrator.

Ubuntu: 2095-1: Linux kernel (Saucy HWE) vulnerability (Jan 31)

The system could be made to crash or run programs as an administrator.

Ubuntu: 2096-1: Linux kernel vulnerability (Jan 31)

The system could be made to crash or run programs as an administrator.

Ubuntu: 2092-1: QEMU vulnerabilities (Jan 30)

Several security issues were fixed in QEMU.

Ubuntu: 2093-1: libvirt vulnerabilities (Jan 30)

Several security issues were fixed in libvirt.

Ubuntu: 2091-1: OTR vulnerabilities (Jan 30)

Applications using the OTR secure chat protocol could be made to exposesensitive information over the network.

Ubuntu: 2090-1: Munin vulnerabilities (Jan 27)

Several security issues were fixed in Munin.

Ubuntu: 2089-1: openjdk-7 vulnerabilities (Jan 23)

Several security issues were fixed in OpenJDK 7.

Ubuntu: 2088-1: NSS vulnerability (Jan 23)

NSS could be made to expose sensitive information over the network.

Ubuntu: 2087-1: NSPR vulnerability (Jan 23)

NSPR could be made to crash or run programs if it received a speciallycrafted certificate.