Thank you for reading the Linux Advisory Watch Security Newsletter. The purpose of this document is to provide our readers with a quick summary of each week's vendor security bulletins and pointers on methods to improve the security posture of your open source system. Vulnerabilities affect nearly every vendor virtually every week, so be sure to read through to find the updates your distributor have made available.

LinuxSecurity.com Feature Extras:

Essential tools for hardening and securing Unix based Environments - System administrators are aware as how important their systems security is, not just the runtime of their servers. Intruders, spammers, DDOS attack, crackers, are all out there trying to get into people's computers, servers and everywhere they can lay hands on and interrupt the normal runtime of services.

Securing a Linux Web Server - With the significant prevalence of Linux web servers globally, security is often touted as a strength of the platform for such a purpose. However, a Linux based web server is only as secure as its configuration and very often many are quite vulnerable to compromise. While specific configurations vary wildly due to environments or specific use, there are various general steps that can be taken to insure basic security considerations are in place.


  (Aug 20)
 

Security Report Summary

  (Aug 20)
 

Security Report Summary

  (Aug 19)
 

Security Report Summary

  (Aug 19)
 

Security Report Summary

  (Aug 18)
 

Security Report Summary

  (Aug 18)
 

Security Report Summary

  (Aug 18)
 

Security Report Summary

  (Aug 17)
 

Security Report Summary

  (Aug 13)
 

Security Report Summary


  (Aug 20)
 

* denial of service in glob_()

  (Aug 20)
 

Update to 10.0.21

  (Aug 20)
 

Update to 10.0.21

  (Aug 19)
 

New upstream release 5.3.2. Fixes CVE-2014-9221 and CVE-2015-3991.

  (Aug 19)
 

New upstream release 5.3.2. Fixes CVE-2014-9221 and CVE-2015-3991.

  (Aug 19)
 

This update fixes CVE-2015-5186. The issue is that ausearch/report did not escape terminal emulator sequences when interpreting untrusted data.

  (Aug 19)
 

Update to RubyGems 2.2.5.

  (Aug 19)
 

This update brings fixes for vulnerabilities published with openssh-7.0 and is fixing pam_ssh_agent_auth module to be functional again.

  (Aug 19)
 

This update fixes CVE-2015-5186. The issue is that ausearch/report did not escape terminal emulator sequences when interpreting untrusted data.

  (Aug 19)
 

The 4.1.5 update contains a number of important fixes across the tree.

  (Aug 19)
 

Gabriel Vlasiu reported that xfs_metadump, part of the xfsprogs suite of tools for the XFS filesystem, did not properly obfuscate data. xfs_metadump properly obfuscates active metadata, but the rest of the space within that fs block comes through in the clear. This could lead to exposure of stale disk data via the produced metadump image.The expectation of xfs_metadump is to obfuscate all but the shortest names in the metadata, as noted in the manpage:By default, xfs_metadump obfuscates most file (regular file, directory and symbolic link) names and extended attribute names to allow the dumps to be sent without revealing confidential information. Extended attribute values are zeroed and no data is copied. The only exceptions are file or attribute names that are 4 or less characters in length. Also file names that span extents (this can only occur with the mkfs.xfs(8) options where -n size > -b size) are not obfuscated. Names between 5 and 8 characters in length inclusively are partially obfuscated.While the xfs_metadump tool can be run by unprivileged users, it requires appropriate permissions to access block devices (such as root) where the sensitive data might be dumped. An unprivileged user, without access to the block device, could not use this flaw to obtain sensitive data they would not otherwise have permission to access.

  (Aug 19)
 

Gabriel Vlasiu reported that xfs_metadump, part of the xfsprogs suite of tools for the XFS filesystem, did not properly obfuscate data. xfs_metadump properly obfuscates active metadata, but the rest of the space within that fs block comes through in the clear. This could lead to exposure of stale disk data via the produced metadump image.The expectation of xfs_metadump is to obfuscate all but the shortest names in the metadata, as noted in the manpage:By default, xfs_metadump obfuscates most file (regular file, directory and symbolic link) names and extended attribute names to allow the dumps to be sent without revealing confidential information. Extended attribute values are zeroed and no data is copied. The only exceptions are file or attribute names that are 4 or less characters in length. Also file names that span extents (this can only occur with the mkfs.xfs(8) options where -n size > -b size) are not obfuscated. Names between 5 and 8 characters in length inclusively are partially obfuscated.While the xfs_metadump tool can be run by unprivileged users, it requires appropriate permissions to access block devices (such as root) where the sensitive data might be dumped. An unprivileged user, without access to the block device, could not use this flaw to obtain sensitive data they would not otherwise have permission to access.

  (Aug 19)
 

Fix for CVE-2015-3225: Potential Denial of Service Vulnerability in Rack- Related rhbz#CVE-2015-3225New rubygem-rack-1.6.1-1.fc22

  (Aug 19)
 

The 4.1.5 update contains a number of important fixes across the tree

  (Aug 19)
 

* update to 2.4.2* fix CVE-2015-3026* use %license on Fedora 22+

  (Aug 19)
 

Backport upstream fixes: Use-after-free bug in Decoder.cpp

  (Aug 19)
 

* update to 2.4.2* fix CVE-2015-3026

  (Aug 18)
 

Update to 2.0.3 release to fix various CVE issues.

  (Aug 18)
 

updated to 3.3.17

  (Aug 18)
 

Update flac to fix security issue in xmms-flac plugin (previously an independent subpackage that was out of date).

  (Aug 18)
 

Security fix for CVE-2015-2774

  (Aug 18)
 

Security fix for CVE-2015-2774

  (Aug 18)
 

Update flac to fix security issue in xmms-flac plugin (previously an independent subpackage that was out of date).

  (Aug 18)
 

security fixes for net/http smuggling

  (Aug 18)
 

Update to 2.0.3 release to fix various CVE issues.

  (Aug 18)
 

security fixes for net/http smuggling

  (Aug 18)
 

New emergency security release

  (Aug 18)
 

New upstream release, fixing several security issues and providing pam_ssh_agent_auth functionality.

  (Aug 18)
 

WebKitGTK+ 2.8.5 includes fixes for 3 security issues. Additional fixes:* Fix the window size reported when the web view isn't realized yet. This fixes the layout of some websites when opening new tabs in the browser and anchor links when opened in new tabs too.* Prevent clipboard contents from being lost when web process finishes.* Always allow font matching for strong aliases.* Move GStreamer missing plugins installer to the UI process.* Fix a crash when spell checker returns no guesses.* Fix a crash when SoupSession is destroyed in exit handler.* Fix a crash closing a page when default context menu is open.* Several crashes and rendering issues fixed.* Translation updates: Swedish.

  (Aug 18)
 

New emergency security release

  (Aug 18)
 

* Rebased to version 2.3.1* Fix crash in qemu_spice_create_display (bz #1163047)* Fix qemu-img map crash for unaligned image (bz #1229394)* CVE-2015-3209: pcnet: multi-tmd buffer overflow in the tx path (bz #1230536)* CVE-2015-3214: i8254: out-of-bounds memory access (bz #1243728)* CVE-2015-5158: scsi stack buffer overflow (bz #1246025)* CVE-2015-5154: ide: atapi: heap overflow during I/O buffer memory access (bz #1247141)* CVE-2015-5166: BlockBackend object use after free issue (bz #1249758)* CVE-2015-5745: buffer overflow in virtio-serial (bz #1251160)* CVE-2015-5165: rtl8139 uninitialized heap memory information leakage to guest (bz #1249755)

  (Aug 18)
 

Update to 2.0.3 release to fix various CVE issues.

  (Aug 18)
 

For list of changes see: https://www.mozilla.org/en-US/firefox/40.0/releasenotes/

  (Aug 14)
 

For list of changes see: https://www.mozilla.org/en-US/firefox/40.0/releasenotes/

  (Aug 14)
 

Security fix for CVE-2013-7440

  (Aug 14)
 

Security fix for CVE-2013-7440

  (Aug 14)
 

Update flac to fix security issue in xmms-flac plugin (previously an independent subpackage that was out of date).

  (Aug 14)
 

* update to 2.4.2* fix CVE-2015-3026* use %license on Fedora 22+

  (Aug 14)
 

Update to KeePass 2.30. Add workaround for missing dependency on libgdiplus.so with Mono 4.

  (Aug 13)
 

updated to 3.3.17

  (Aug 13)
 

This release fixes buffer overflows when compiling certain expressions.

  (Aug 13)
 

**WordPress 4.2.4 Security and Maintenance Release**WordPress 4.2.4 is now available. This is a security release for all previous versions and we strongly encourage you to update your sites immediately.This release addresses six issues, including three cross-site scripting vulnerabilities and a potential SQL injection that could be used to compromise a site, which were discovered by Marc-Alexandre Montpas of Sucuri, Helen Hou-Sandí of the WordPress security team, Netanel Rubin of Check Point, and Ivan Grigorov. It also includes a fix for a potential timing side-channel attack, discovered by Johannes Schmitt of Scrutinizer, and prevents an attacker from locking a post from being edited, discovered by Mohamed A. Baset.Our thanks to those who have practiced responsible disclosure of security issues.WordPress 4.2.4 also fixes four bugs. For more information, see: the release notes or consult the list of changes.* the release notes: https://wordpress.org/documentation/wordpress-version/version-4-2-4/* the list of changes: https://core.trac.wordpress.org/log/branches/4.2?rev=33573&stop_rev=33396 **WordPress 4.2.3 Security and Maintenance Release**WordPress 4.2.3 is now available. This is a security release for all previous versions and we strongly encourage you to update your sites immediately.WordPress versions 4.2.2 and earlier are affected by a cross-site scripting vulnerability, which could allow users with the Contributor or Author role to compromise a site. This was initially reported by Jon Cave and fixed by Robert Chapin, both of the WordPress security team, and later reported by Jouko Pynnönen.We also fixed an issue where it was possible for a user with Subscriber permissions to create a draft through Quick Draft. Reported by Netanel Rubin from Check Point Software Technologies.Our thanks to those who have practiced responsible disclosure of security issues.WordPress 4.2.3 also contains fixes for 20 bugs from 4.2. For more information, see:* the release notes: https://wordpress.org/documentation/wordpress-version/version-4-2-3/* the list of changes: https://core.trac.wordpress.org/log/branches/4.2?rev=33382&stop_rev=32430

  (Aug 13)
 

* Fix unsafe signal handlers to avoid DoS attack [CVE-2015-0847].

  (Aug 13)
 

* Fix unsafe signal handlers to avoid DoS attack [CVE-2015-0847].

  (Aug 13)
 

**WordPress 4.2.4 Security and Maintenance Release**WordPress 4.2.4 is now available. This is a security release for all previous versions and we strongly encourage you to update your sites immediately.This release addresses six issues, including three cross-site scripting vulnerabilities and a potential SQL injection that could be used to compromise a site, which were discovered by Marc-Alexandre Montpas of Sucuri, Helen Hou-Sandí of the WordPress security team, Netanel Rubin of Check Point, and Ivan Grigorov. It also includes a fix for a potential timing side-channel attack, discovered by Johannes Schmitt of Scrutinizer, and prevents an attacker from locking a post from being edited, discovered by Mohamed A. Baset.Our thanks to those who have practiced responsible disclosure of security issues.WordPress 4.2.4 also fixes four bugs. For more information, see: the release notes or consult the list of changes.* the release notes: https://wordpress.org/documentation/wordpress-version/version-4-2-4/* the list of changes: https://core.trac.wordpress.org/log/branches/4.2?rev=33573&stop_rev=33396 **WordPress 4.2.3 Security and Maintenance Release**WordPress 4.2.3 is now available. This is a security release for all previous versions and we strongly encourage you to update your sites immediately.WordPress versions 4.2.2 and earlier are affected by a cross-site scripting vulnerability, which could allow users with the Contributor or Author role to compromise a site. This was initially reported by Jon Cave and fixed by Robert Chapin, both of the WordPress security team, and later reported by Jouko Pynnönen.We also fixed an issue where it was possible for a user with Subscriber permissions to create a draft through Quick Draft. Reported by Netanel Rubin from Check Point Software Technologies.Our thanks to those who have practiced responsible disclosure of security issues.WordPress 4.2.3 also contains fixes for 20 bugs from 4.2. For more information, see:* the release notes: https://wordpress.org/documentation/wordpress-version/version-4-2-3/* the list of changes: https://core.trac.wordpress.org/log/branches/4.2?rev=33382&stop_rev=32430


  (Aug 15)
 

A bug in the Icecast code handling source client URL authentication causes a Denial of Service condition.

  (Aug 15)
 

Multiple vulnerabilities have been found in libgadu, the worst of which may result in execution of arbitrary code.

  (Aug 15)
 

Multiple vulnerabilities have been found in Adobe Flash Player, the worst of which allows remote attackers to execute arbitrary code.


  Red Hat: 2015:1647-01: mariadb55-mariadb: Moderate Advisory (Aug 20)
 

Updated mariadb55-mariadb packages that fix several security issues are now available for Red Hat Software Collections 2. Red Hat Product Security has rated this update as having Moderate security [More...]

  Red Hat: 2015:1646-01: rh-mariadb100-mariadb: Important Advisory (Aug 20)
 

Updated rh-mariadb100-mariadb packages that fix several security issues are now available for Red Hat Software Collections 2. Red Hat Product Security has rated this update as having Important security [More...]

  Red Hat: 2015:1643-01: kernel: Moderate Advisory (Aug 18)
 

Updated kernel packages that fix one security issue and two bugs are now available for Red Hat Enterprise Linux 6.4 Advanced Update Support. Red Hat Product Security has rated this update as having Moderate security [More...]

  Red Hat: 2015:1640-01: pam: Moderate Advisory (Aug 18)
 

An updated pam package that fixes one security issue is now available for Red Hat Enterprise Linux 6 and 7. Red Hat Product Security has rated this update as having Moderate [More...]

  Red Hat: 2015:1639-01: openstack-glance: Important Advisory (Aug 17)
 

Updated openstack-glance packages that fix one security issue are now available for Red Hat Enterprise Linux OpenStack Platform 7.0. Red Hat Product Security has rated this update as having an Important [More...]

  Red Hat: 2015:1636-01: net-snmp: Moderate Advisory (Aug 17)
 

Updated net-snmp packages that fix one security issue are now available for Red Hat Enterprise Linux 6 and 7. Red Hat Product Security has rated this update as having Moderate [More...]

  Red Hat: 2015:1635-01: sqlite: Moderate Advisory (Aug 17)
 

An updated sqlite package that fixes three security issues is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having Moderate security [More...]

  Red Hat: 2015:1634-01: sqlite: Moderate Advisory (Aug 17)
 

An updated sqlite package that fixes one security issue is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having Moderate security [More...]

  Red Hat: 2015:1633-01: subversion: Moderate Advisory (Aug 17)
 

Updated subversion packages that fix three security issues are now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having Moderate security [More...]

  Red Hat: 2015:1630-01: rh-mysql56-mysql: Important Advisory (Aug 17)
 

Updated rh-mysql56-mysql packages that fix several security issues are now available for Red Hat Software Collections 2. Red Hat Product Security has rated this update as having Important security [More...]

  Red Hat: 2015:1629-01: mysql55-mysql: Moderate Advisory (Aug 17)
 

Updated mysql55-mysql packages that fix several security issues are now available for Red Hat Software Collections 2. Red Hat Product Security has rated this update as having Moderate security [More...]

  Red Hat: 2015:1627-01: glibc: Moderate Advisory (Aug 17)
 

Updated glibc packages that fix one security issue are now available for Red Hat Linux 5. Red Hat Product Security has rated this update as having Moderate security [More...]

  Red Hat: 2015:1628-01: mysql55-mysql: Moderate Advisory (Aug 17)
 

Updated mysql55-mysql packages that fix several security issues are now available for Red Hat Enterprise Linux 5. Red Hat Product Security has rated this update as having Moderate security [More...]

  Red Hat: 2015:1623-01: kernel: Important Advisory (Aug 13)
 

Updated kernel packages that fix two security issues and several bugs are now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having Important security [More...]


  (Aug 14)
 

New mozilla-thunderbird packages are available for Slackware 14.1 and -current to fix security issues. [More Info...]

  (Aug 14)
 

New mozilla-firefox packages are available for Slackware 14.1 to fix security issues. [More Info...]


  Ubuntu: 2702-3: Firefox regression (Aug 20)
 

USN-2702-1 introduced a regression in Firefox.

  Ubuntu: 2721-1: Subversion vulnerabilities (Aug 20)
 

Several security issues were fixed in Subversion.

  Ubuntu: 2720-1: Django vulnerability (Aug 18)
 

Django could be made to crash if it received specially crafted networktraffic.

  Ubuntu: 2710-2: OpenSSH regression (Aug 18)
 

USN-2710-1 introduced a regression in OpenSSH.

  Ubuntu: 2719-1: Linux kernel vulnerability (Aug 17)
 

The system could be made to crash under certain conditions.

  Ubuntu: 2718-1: Linux kernel (Vivid HWE) vulnerability (Aug 17)
 

The system could be made to crash under certain conditions.

  Ubuntu: 2713-1: Linux kernel vulnerabilities (Aug 17)
 

Several security issues were fixed in the kernel.

  Ubuntu: 2714-1: Linux kernel (OMAP4) vulnerabilities (Aug 17)
 

Several security issues were fixed in the kernel.

  Ubuntu: 2715-1: Linux kernel (Trusty HWE) vulnerability (Aug 17)
 

The system could be made to crash under certain conditions.

  Ubuntu: 2717-1: Linux kernel (Utopic HWE) vulnerability (Aug 17)
 

The system could be made to crash under certain conditions.

  Ubuntu: 2716-1: Linux kernel vulnerability (Aug 17)
 

The system could be made to crash under certain conditions.

  Ubuntu: 2711-1: Net-SNMP vulnerabilities (Aug 17)
 

Net-SNMP could be made to crash or run programs if it received speciallycrafted network traffic.

  Ubuntu: 2709-1: pollinate update (Aug 14)
 

The certificate bundled with pollinate has been refreshed.

  Ubuntu: 2710-1: OpenSSH vulnerabilities (Aug 14)
 

Several security issues were fixed in OpenSSH.