Thank you for reading the Linux Advisory Watch Security Newsletter. The purpose of this document is to provide our readers with a quick summary of each week's vendor security bulletins and pointers on methods to improve the security posture of your open source system. Vulnerabilities affect nearly every vendor virtually every week, so be sure to read through to find the updates your distributor have made available.

LinuxSecurity.com Feature Extras:

Peter Smith Releases Linux Network Security Online - Thanks so much to Peter Smith for announcing on linuxsecurity.com the release of his Linux Network Security book available free online. "In 2005 I wrote a book on Linux security. 8 years later and the publisher has gone out of business. Now that I'm free from restrictions on reproducing material from the book, I have decided to make the entire book available online."

Securing a Linux Web Server - With the significant prevalence of Linux web servers globally, security is often touted as a strength of the platform for such a purpose. However, a Linux based web server is only as secure as its configuration and very often many are quite vulnerable to compromise. While specific configurations vary wildly due to environments or specific use, there are various general steps that can be taken to insure basic security considerations are in place.


(Jul 11)

Security Report Summary

(Jul 11)

Security Report Summary

(Jul 10)

Security Report Summary

(Jul 9)

Security Report Summary

(Jul 8)

Security Report Summary

(Jul 7)

Security Report Summary

(Jul 6)

Security Report Summary


(Jul 9)

Multiple vulnerabilities have been found in Adobe Flash Player, worst of which allows remote attackers to execute arbitrary code.


Mandriva: 2014:138: asterisk (Jul 11)

Multiple vulnerabilities has been discovered and corrected in asterisk: Asterisk Open Source 11.x before 11.10.1 and 12.x before 12.3.1 and Certified Asterisk 11.6 before 11.6-cert3 allows remote authenticated Manager users to execute arbitrary shell commands via a MixMonitor [More...]

Mandriva: 2014:137: apache-mod_wsgi (Jul 11)

Multiple vulnerabilities has been discovered and corrected in apache-mod_wsgi: It was found that mod_wsgi did not properly drop privileges if the call to setuid\(\) failed. If mod_wsgi was set up to allow [More...]

Mandriva: 2014:136: samba (Jul 11)

Updated samba packages fix security vulnerabilities: Information leak vulnerability in the VFS code, allowing an authenticated user to retrieve eight bytes of uninitialized memory when shadow copy is enabled (CVE-2014-0178). [More...]

Mandriva: 2014:135: python (Jul 10)

Updated python and python-simplejson package fixes security vulnerability Python are susceptible to arbitrary process memory reading by a user or adversary due to a bug in the _json module caused by insufficient [More...]

Mandriva: 2014:134: liblzo (Jul 10)

Updated liblzo packages fix security vulnerability: An integer overflow in liblzo before 2.07 allows attackers to cause a denial of service or possibly code execution in applications performing LZO decompression on a compressed payload from the attacker [More...]

Mandriva: 2014:133: gd (Jul 10)

Updated gd and libgd packages fix security vulnerability: The gdImageCreateFromXpm function in gdxpm.c in the gd image library allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted color table in an [More...]

Mandriva: 2014:132: libxfont (Jul 9)

Updated libxfont packages fix security vulnerabilities: Ilja van Sprundel discovered that libXfont incorrectly handled font metadata file parsing. A local attacker could use this issue to cause libXfont to crash, or possibly execute arbitrary code in order to [More...]

Mandriva: 2014:131: file (Jul 9)

Updated file packages fix security vulnerabilities: A flaw was found in the way file parsed property information from Composite Document Files (CDF) files, where the mconvert() function did not correctly compute the truncated pascal string size (CVE-2014-3478). [More...]

Mandriva: 2014:130: php (Jul 9)

Updated php packages fix security vulnerabilities: The unserialize() function in PHP before 5.4.30 and 5.5.14 has a Type Confusion issue related to the SPL ArrayObject and SPLObjectStorage Types (CVE-2014-3515). [More...]

Mandriva: 2014:129: ffmpeg (Jul 9)

Multiple vulnerabilities has been discovered and corrected in ffmpeg: Multiple unspecified vulnerabilities in libavcodec/wmalosslessdec.c in FFmpeg before 0.11 have unknown impact and attack vectors related to (1) size of mclms arrays, (2) a get_bits(0) in decode_ac_filter, and [More...]

Mandriva: 2014:128: iodine (Jul 9)

Updated iodine packages fix security vulnerability: Oscar Reparaz discovered an authentication bypass vulnerability in iodine, a tool for tunneling IPv4 data through a DNS server. A remote attacker could provoke a server to accept the rest of the setup or [More...]

Mandriva: 2014:127: gnupg (Jul 9)

Updated gnupg and gnupg2 packages fix security vulnerability: GnuPG versions before 1.4.17 and 2.0.24 are vulnerable to a denial of service which can be caused by garbled compressed data packets which may put gpg into an infinite loop (CVE-2014-4617). [More...]

Mandriva: 2014:126: phpmyadmin (Jul 8)

Multiple vulnerabilities has been discovered and corrected in phpmyadmin: Multiple cross-site scripting (XSS) vulnerabilities in phpMyAdmin 4.2.x before 4.2.4 allow remote authenticated users to inject arbitrary web [More...]


Red Hat: 2014:0867-01: samba: Moderate Advisory (Jul 9)

Updated samba packages that fix three security issues are now available for Red Hat Enterprise Linux 7. The Red Hat Security Response Team has rated this update as having Moderate [More...]

Red Hat: 2014:0866-01: samba and samba3x: Moderate Advisory (Jul 9)

Updated samba3x and samba packages that fix two security issues are now available for Red Hat Enterprise Linux 5 and 6 respectively. The Red Hat Security Response Team has rated this update as having Moderate [More...]

Red Hat: 2014:0861-02: lzo: Moderate Advisory (Jul 9)

Updated lzo packages that fix one security issue are now available for Red Hat Enterprise Linux 6 and 7. The Red Hat Security Response Team has rated this update as having Moderate [More...]

Red Hat: 2014:0860-01: flash-plugin: Critical Advisory (Jul 9)

An updated Adobe Flash Player package that fixes three security issues is now available for Red Hat Enterprise Linux 5 and 6 Supplementary. The Red Hat Security Response Team has rated this update as having Critical [More...]

Red Hat: 2014:0865-01: tomcat6: Moderate Advisory (Jul 9)

Updated tomcat6 packages that fix three security issues and two bugs are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having Moderate [More...]


(Jul 12)

New php packages are available for Slackware 14.0, 14.1, and -current to fix security issues. [More Info...]


Ubuntu: 2276-1: PHP vulnerabilities (Jul 9)

Several security issues were fixed in PHP.

Ubuntu: 2275-1: DBus vulnerabilities (Jul 8)

Several security issues were fixed in DBus.

Ubuntu: 2271-1: Linux kernel (Saucy HWE) vulnerability (Jul 6)

The system could be made to crash or run programs as an administrator.

Ubuntu: 2267-1: Linux kernel (EC2) vulnerability (Jul 6)

The system could be made to crash or run programs as an administrator.

Ubuntu: 2266-1: Linux kernel vulnerability (Jul 6)

The system could be made to crash or run programs as an administrator.

Ubuntu: 2270-1: Linux kernel (Raring HWE) vulnerability (Jul 6)

The system could be made to crash or run programs as an administrator.

Ubuntu: 2268-1: Linux kernel vulnerability (Jul 6)

The system could be made to crash or run programs as an administrator.

Ubuntu: 2272-1: Linux kernel (Trusty HWE) vulnerability (Jul 6)

The system could be made to crash or run programs as an administrator.

Ubuntu: 2274-1: Linux kernel vulnerability (Jul 6)

The system could be made to crash or run programs as an administrator.

Ubuntu: 2269-1: Linux kernel (Quantal HWE) vulnerability (Jul 6)

The system could be made to crash or run programs as an administrator.