Linux Advisory Watch: July 5th, 2013
Source: LinuxSecurity Contributors - Posted by Benjamin D. Thomas   
Linux Advisory Watch Thank you for reading the Linux Advisory Watch Security Newsletter. The purpose of this document is to provide our readers with a quick summary of each week's vendor security bulletins and pointers on methods to improve the security posture of your open source system. Vulnerabilities affect nearly every vendor virtually every week, so be sure to read through to find the updates your distributor have made available.

LinuxSecurity.com Feature Extras:

Securing a Linux Web Server - With the significant prevalence of Linux web servers globally, security is often touted as a strength of the platform for such a purpose. However, a Linux based web server is only as secure as its configuration and very often many are quite vulnerable to compromise. While specific configurations vary wildly due to environments or specific use, there are various general steps that can be taken to insure basic security considerations are in place.

Password guessing with Medusa 2.0 - Medusa was created by the fine folks at foofus.net, in fact the much awaited Medusa 2.0 update was released in February of 2010. For a complete change log please visit http://www.foofus.net/jmk/medusa/changelog


  Debian: 2718-1: wordpress: Multiple vulnerabilities (Jul 2)
 

Several vulnerabilities were identified in Wordpress, a web blogging tool. As the CVEs were allocated from releases announcements and specific fixes are usually not identified, it has been decided to upgrade the Wordpress package to the latest upstream version instead of [More...]

  Debian: 2717-1: xml-security-c: heap overflow (Jun 28)
 

Jon Erickson of iSIGHT Partners Labs discovered a heap overflow in xml-security-c, an implementation of the XML Digital Security specification. The fix to address CVE-2013-2154 introduced the possibility of a heap overflow in the processing of malformed XPointer [More...]


  Mandriva: 2013:192: php-radius (Jul 2)
 

A security vulnerability was discovered and fixed in php-radius. Fix a security issue in radius_get_vendor_attr() by enforcing checks of the VSA length field against the buffer size (CVE-2013-2220). [More...]

  Mandriva: 2013:191: fail2ban (Jul 2)
 

Updated fail2ban packages fix CVE-2013-2178 Krzysztof Katowicz-Kowalewski discovered a vulnerability in Fail2ban, a log monitoring and system which can act on attack by preventing hosts to connect to specified services using the local firewall. [More...]

  Mandriva: 2013:190: autotrace (Jul 2)
 

Updated autotrace package fixes security vulnerability: Stack-based buffer overflow in bmp parser (CVE-2013-1953). Updated autotrace package corrects the issue. [More...]

  Mandriva: 2013:189: wordpress (Jul 2)
 

Updated wordpress package fixes security vulnerabilities: A denial of service flaw was found in the way Wordpress, a blog tool and publishing platform, performed hash computation when checking password for password protected blog posts. A remote attacker could [More...]

  Mandriva: 2013:188: otrs (Jul 2)
 

Updated otrs package fixes security vulnerabilities: An attacker with a valid agent login could manipulate URLs in the ticket watch mechanism to see contents of tickets they are not permitted to see (CVE-2013-3551, CVE-2013-4088). [More...]

  Mandriva: 2013:187: apache-mod_security (Jul 2)
 

Updated apache-mod_security packages fix security vulnerability: When ModSecurity receives a request body with a size bigger than the value set by the SecRequestBodyInMemoryLimit and with a Content-Type that has no request body processor mapped to it, ModSecurity will [More...]

  Mandriva: 2013:186: puppet (Jun 28)
 

Updated puppet packages fix remote code execution vulnerability When making REST api calls, the puppet master takes YAML from an untrusted client, deserializes it, and then calls methods on the resulting object. A YAML payload can be crafted to cause the [More...]

  Mandriva: 2013:185: perl-Module-Signature (Jun 27)
 

Updated perl-Module-Signature package fixes CVE-2013-2145 Arbitrary code execution vulnerability in Module::Signature before 0.72 (CVE-2013-2145). [More...] _______________________________________________________________________

  Mandriva: 2013:184: perl-Dancer (Jun 27)
 

Updated perl-Dancer package fixes CVE-2012-5572 A security flaw was found in the way Dancer.pm, lightweight yet powerful web application framework / Perl language module, performed sanitization of values to be used for cookie() and cookies() methods. A [More...]

  Mandriva: 2013:183: java-1.7.0-openjdk (Jun 27)
 

Updated java-1.7.0-openjdk packages fix multiple security vulnerabilities Multiple flaws were discovered in the ImagingLib and the image attribute, channel, layout and raster processing in the 2D [More...]

  Mandriva: 2013:182: mesa (Jun 27)
 

Updated mesa packages fix multiple vulnerabilties An out-of-bounds access flaw was found in Mesa. If an application using Mesa exposed the Mesa API to untrusted inputs (Mozilla Firefox does this), an attacker could cause the application to crash or, [More...]

  Mandriva: 2013:181: mesa (Jun 27)
 

A vulnerability has been discovered and corrected in mesa: Multiple integer overflows in X.org libGLX in Mesa 9.1.1 and earlier allow X servers to trigger allocation of insufficient memory and a buffer overflow via vectors related to the (1) XF86DRIOpenConnection [More...]

  Mandriva: 2013:180: curl (Jun 27)
 

A vulnerability has been discovered and corrected in curl: libcurl is vulnerable to a case of bad checking of the input data which may lead to heap corruption. The function curl_easy_unescape() decodes URL encoded strings to raw binary data. URL encoded octets are [More...]


  Red Hat: 2013:1014-01: java-1.6.0-openjdk: Important Advisory (Jul 3)
 

Updated java-1.6.0-openjdk packages that fix various security issues are now available for Red Hat Enterprise Linux 5 and 6. The Red Hat Security Response Team has rated this update as having [More...]

  Red Hat: 2013:0995-01: Foreman: Important Advisory (Jun 27)
 

Updated Foreman packages that fix two security issues and multiple bugs are now available for Red Hat OpenStack 3.0 (Grizzly) Preview. The Red Hat Security Response Team has rated this update as having [More...]

  Red Hat: 2013:0993-01: openstack-swift: Moderate Advisory (Jun 27)
 

Updated openstack-swift packages that fix one security issue and one bug are now available for Red Hat OpenStack 3.0 (Grizzly) Preview. The Red Hat Security Response Team has rated this update as having moderate [More...]

  Red Hat: 2013:0994-01: openstack-keystone: Important Advisory (Jun 27)
 

Updated openstack-keystone packages that fix one security issue and various bugs are now available for Red Hat OpenStack 3.0 (Grizzly) Preview. The Red Hat Security Response Team has rated this update as having [More...]

  Red Hat: 2013:0992-01: python-keystoneclient: Important Advisory (Jun 27)
 

Updated python-keystoneclient packages that fix two security issues, one bug, and add one enhancement are now available for Red Hat OpenStack 3.0 (Grizzly) Preview. [More...]


  Slackware: 2013-180-01: mozilla-firefox: Security Update (Jun 30)
 

New mozilla-firefox packages are available for Slackware 13.37, 14.0, and -current to fix security issues. [More Info...]

  Slackware: 2013-180-02: mozilla-thunderbird: Security Update (Jun 30)
 

New mozilla-thunderbird packages are available for Slackware 13.37, 14.0, and -current to fix security issues. [More Info...]

  Slackware: 2013-178-01: ruby: Security Update (Jun 27)
 

New ruby packages are available for Slackware 13.1, 13.37, 14.0, and -current to fix a security issue. [More Info...]


  Ubuntu: 1900-1: Linux kernel (EC2) vulnerabilities (Jul 4)
 

Several security issues were fixed in the kernel.

  Ubuntu: 1899-1: Linux kernel vulnerabilities (Jul 4)
 

Several security issues were fixed in the kernel.

  Ubuntu: 1897-1: PyMongo vulnerability (Jul 3)
 

PyMongo could be made to crash under certain conditions.

  Ubuntu: 1890-2: Firefox regression (Jul 3)
 

USN-1890-1 introduced a regression in Firefox.

  Ubuntu: 1896-1: Module::Signature perl module vulnerability (Jul 3)
 

Module::Signature could be made to run programs if it verified a signature.

  Ubuntu: 1895-1: libvirt vulnerability (Jul 2)
 

libvirt could be made to crash if it received specially crafted networktraffic.

  Ubuntu: 1894-1: curl vulnerability (Jul 2)
 

libcurl could be made to crash or run programs as your login if it receivedspecially crafted input.

  Ubuntu: 1892-1: ubuntu-release-upgrader vulnerability (Jun 27)
 

ubuntu-release-upgrader would crash when attempting to upgrade.

  Ubuntu: 1893-1: Subversion vulnerabilities (Jun 27)
 

Several security issues were fixed in Subversion.

Only registered users can write comments.
Please login or register.

Powered by AkoComment!