Thank you for reading the Linux Advisory Watch Security Newsletter. The purpose of this document is to provide our readers with a quick summary of each week's vendor security bulletins and pointers on methods to improve the security posture of your open source system. Vulnerabilities affect nearly every vendor virtually every week, so be sure to read through to find the updates your distributor have made available.

LinuxSecurity.com Feature Extras:

Securing a Linux Web Server - With the significant prevalence of Linux web servers globally, security is often touted as a strength of the platform for such a purpose. However, a Linux based web server is only as secure as its configuration and very often many are quite vulnerable to compromise. While specific configurations vary wildly due to environments or specific use, there are various general steps that can be taken to insure basic security considerations are in place.

Peter Smith Releases Linux Network Security Online - Thanks so much to Peter Smith for announcing on linuxsecurity.com the release of his Linux Network Security book available free online. "In 2005 I wrote a book on Linux security. 8 years later and the publisher has gone out of business. Now that I'm free from restrictions on reproducing material from the book, I have decided to make the entire book available online."


  (May 1)
 

Security Report Summary

  (Apr 29)
 

Security Report Summary

  (Apr 29)
 

Security Report Summary

  (Apr 29)
 

Security Report Summary

  (Apr 26)
 

Security Report Summary

  (Apr 26)
 

Security Report Summary

  (Apr 25)
 

Security Report Summary

  (Apr 24)
 

Security Report Summary

  (Apr 24)
 

Security Report Summary

  (Apr 24)
 

Security Report Summary


  (Apr 30)
 

- Update to 3.7.2- CVE-2015-1868External References:https://doc.powerdns.com/md/security/powerdns-advisory-2015-01/

  (Apr 30)
 

Update to new version 2.1.20.Fix dependency on python-dns.

  (Apr 30)
 

- Update to 3.4.4- CVE-2015-1868Release notes:https://doc.powerdns.com/md/changelog/#powerdns-authoritative-server-344External References:https://doc.powerdns.com/md/security/powerdns-advisory-2015-01/

  (Apr 30)
 

Fix crash when too many connections are used

  (Apr 30)
 

Security fix for CVE-2015-1859, CVE-2015-1858, CVE-2015-1860

  (Apr 30)
 

R50f is a required security and bugfix release: * Add a patch marker for vendor patch versioning to mksh.1 * SECURITY: make unset HISTFILE actually work * Document some more issues with the current history code * Remove some unused code * RCSID-only sync with OpenBSD, for bogus and irrelevant changes * Also disable field splitting for alias 'local= ypeset' * Fix read -n-1 to not be identical to read -N-1 * Several fixes and improvements to lksh(1) and mksh(1) manpages * More code (int