LinuxSecurity.com
Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Welcome!
Sign up!
EnGarde Community
Login
Polls
What is the most important Linux security technology?
 
Advisories
Community
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
SELinux
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Securitydistro
Latest Newsletters
Linux Security Week: October 20th, 2014
Linux Advisory Watch: October 17th, 2014
Subscribe
LinuxSecurity Newsletters
E-mail:
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

  
Linux Advisory Watch: August 29th, 2014 Print E-mail
User Rating:      How can I rate this item?
Source: LinuxSecurity Contributors - Posted by Benjamin D. Thomas   
Linux Advisory Watch Thank you for reading the Linux Advisory Watch Security Newsletter. The purpose of this document is to provide our readers with a quick summary of each week's vendor security bulletins and pointers on methods to improve the security posture of your open source system. Vulnerabilities affect nearly every vendor virtually every week, so be sure to read through to find the updates your distributor have made available.

LinuxSecurity.com Feature Extras:

Peter Smith Releases Linux Network Security Online - Thanks so much to Peter Smith for announcing on linuxsecurity.com the release of his Linux Network Security book available free online. "In 2005 I wrote a book on Linux security. 8 years later and the publisher has gone out of business. Now that I'm free from restrictions on reproducing material from the book, I have decided to make the entire book available online."

Securing a Linux Web Server - With the significant prevalence of Linux web servers globally, security is often touted as a strength of the platform for such a purpose. However, a Linux based web server is only as secure as its configuration and very often many are quite vulnerable to compromise. While specific configurations vary wildly due to environments or specific use, there are various general steps that can be taken to insure basic security considerations are in place.


  Debian: 3014-1: squid3: Summary (Aug 28)
 

Security Report Summary

  Debian: 3013-1: s3ql: Summary (Aug 27)
 

Security Report Summary

  Debian: 3012-1: eglibc: Summary (Aug 27)
 

Security Report Summary

  Debian: 3011-1: mediawiki: Summary (Aug 23)
 

Security Report Summary

  Debian: 3010-1: python-django: Summary (Aug 22)
 

Security Report Summary

  Debian: 3009-1: python-imaging: Summary (Aug 21)
 

Security Report Summary

  Debian: 3008-2: php5: Summary (Aug 21)
 

Security Report Summary

  Debian: 2940-1: libstruts1.2-java: Summary (Aug 21)
 

Security Report Summary

  Debian: 3008-1: php5: Summary (Aug 21)
 

Security Report Summary


  Gentoo: 201408-12 Apache HTTP Server: Multiple vulnerabilities (Aug 29)
 

Multiple vulnerabilities have been discovered in Apache HTTP Server, the worse of which could lead to execution of arbitrary code or a Denial of Service condition

  Gentoo: 201408-11 PHP: Multiple vulnerabilities (Aug 29)
 

Multiple vulnerabilities have been discovered in PHP, the worst of which could lead to remote execution of arbitrary code.

  Gentoo: 201408-10 Libgcrypt: Side-channel attack (Aug 29)
 

A vulnerability in Libgcrypt could allow a remote attacker to extract ElGamal private key information.

  Gentoo: 201408-09 GNU Libtasn1: Multiple vulnerabilities (Aug 29)
 

Multiple vulnerabilities have been discovered in GNU Libtasn1, the worse of which can allow a context-dependent attacker to cause a Denial of Service condition.

  Gentoo: 201408-08 file: Denial of Service (Aug 29)
 

A vulnerability in file could result in Denial of Service.


  Red Hat: 2014:1102-01: ror40-rubygem-activerecord: Important Advisory (Aug 27)
 

Updated ror40-rubygem-activerecord packages that fix one security issue are now available for Red Hat Software Collections 1. Red Hat Product Security has rated this update as having Important security [More...]

  Red Hat: 2014:1101-01: kernel: Important Advisory (Aug 27)
 

Updated kernel packages that fix multiple security issues and several bugs are now available for Red Hat Enterprise Linux 6.4 Extended Update Support. Red Hat Product Security has rated this update as having Important security [More...]


  Ubuntu: 2328-1: GNU C Library vulnerability (Aug 28)
 

Certain applications could be made to crash or run programs as anadministrator.

  Ubuntu: 2327-1: Squid 3 vulnerability (Aug 28)
 

Squid could be made to crash if it received specially crafted networktraffic.

  Ubuntu: 2319-2: OpenJDK 7 regression (Aug 25)
 

USN-2319-1 introduced a regression in OpenJDK 7.

  Ubuntu: 2325-1: OpenStack Nova vulnerability (Aug 21)
 

OpenStack Nova could be made to expose sensitive information over thenetwork.

  Ubuntu: 2324-1: OpenStack Keystone vulnerabilities (Aug 21)
 

Several security issues were fixed in OpenStack Keystone.

  Ubuntu: 2323-1: OpenStack Horizon vulnerabilities (Aug 21)
 

Several security issues were fixed in OpenStack Horizon.

  Ubuntu: 2322-1: OpenStack Glance vulnerability (Aug 21)
 

OpenStack Glance could be made to stop serving requests.

  Ubuntu: 2321-1: OpenStack Neutron vulnerabilities (Aug 21)
 

OpenStack Neutron could be made to expose sensitive information or crash.

  Ubuntu: 2311-2: OpenStack Ceilometer vulnerability (Aug 21)
 

OpenStack Ceilometer could be made to expose sensitive information.

Only registered users can write comments.
Please login or register.

Powered by AkoComment!

 
< Prev   Next >
    
Partner

 

Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
USB is now UEC (use with extreme caution)
iPhone Encryption and the Return of the Crypto Wars
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2014 Guardian Digital, Inc. All rights reserved.