Thank you for reading the Linux Advisory Watch Security Newsletter. The purpose of this document is to provide our readers with a quick summary of each week's vendor security bulletins and pointers on methods to improve the security posture of your open source system. Vulnerabilities affect nearly every vendor virtually every week, so be sure to read through to find the updates your distributor have made available.

LinuxSecurity.com Feature Extras:

Essential tools for hardening and securing Unix based Environments - System administrators are aware as how important their systems security is, not just the runtime of their servers. Intruders, spammers, DDOS attack, crackers, are all out there trying to get into people's computers, servers and everywhere they can lay hands on and interrupt the normal runtime of services.

Securing a Linux Web Server - With the significant prevalence of Linux web servers globally, security is often touted as a strength of the platform for such a purpose. However, a Linux based web server is only as secure as its configuration and very often many are quite vulnerable to compromise. While specific configurations vary wildly due to environments or specific use, there are various general steps that can be taken to insure basic security considerations are in place.


  (Jul 9)
 

Security Report Summary

  (Jul 9)
 

Security Report Summary


  (Jul 15)
 

- Fix for CVE-2015-2141

  (Jul 15)
 

- Fix for CVE-2015-2141

  (Jul 15)
 

## 7.x-2.0-alpha9**This is a security release. People running 7.x-2.0-alpha8 or below should update. This release only contains security fixes, no additional bug fixes or features.**Changes since 7.x-2.0-alpha8:* Issue #2495145 by twistor, cashwilliams, greggles, klausi: Possible XSS in PuSHSubscriber.inc* Issue #2502419 by klausi: Log messages XSS attack vector* Issue #1848498 by twistor: Respect allowed file extensions in file mapper

  (Jul 15)
 

Security fix for CVE-2015-3192

  (Jul 15)
 

## 7.x-2.0-alpha9**This is a security release. People running 7.x-2.0-alpha8 or below should update. This release only contains security fixes, no additional bug fixes or features.**Changes since 7.x-2.0-alpha8:* Issue #2495145 by twistor, cashwilliams, greggles, klausi: Possible XSS in PuSHSubscriber.inc* Issue #2502419 by klausi: Log messages XSS attack vector* Issue #1848498 by twistor: Respect allowed file extensions in file mapper

  (Jul 15)
 

Security fix for CVE-2015-3192

  (Jul 15)
 

Besides other changes, this update mitigates this vulnerability:https://access.redhat.com/security/cve/CVE-2015-3243

  (Jul 14)
 

Security fix for CVE-2015-4411

  (Jul 14)
 

Security fix for CVE-2015-4411

  (Jul 14)
 

Fixes CVE-2015-3258 & CVE-2015-3279

  (Jul 14)
 

Bump to openvas8 because of the issues found in previous versions. This should be the first version with scanner really working on Fedora.

  (Jul 14)
 

Bump to openvas8 because of the issues found in previous versions. This should be the first version with scanner really working on Fedora.

  (Jul 14)
 

Bump to openvas8 because of the issues found in previous versions. This should be the first version with scanner really working on Fedora.

  (Jul 14)
 

Bump to openvas8 because of the issues found in previous versions. This should be the first version with scanner really working on Fedora.

  (Jul 14)
 

Update to version 0.7.1Add patch to fix undefined symbol: ssh_forward_listen (bug #1221310)Update to version 0.7.0Security fix for CVE-2015-3146

  (Jul 13)
 

New upstream - Firefox 39.0

  (Jul 13)
 

Security fix for CVE-2015-1793 high severity issue.

  (Jul 13)
 

Latest upstream.http://www.openwall.com/lists/oss-security/2015/06/25/2 http://www.openwall.com/lists/oss-security/2015/06/25/2

  (Jul 13)
 

This release fixes two heap buffer overflows when compiling certain regular expressions: CVE-2015-3210 and CVE-2015-5073.

  (Jul 13)
 

Security fix for CVE-2015-1793 high severity issue.

  (Jul 13)
 

Latest upstream.http://www.openwall.com/lists/oss-security/2015/06/25/2 http://www.openwall.com/lists/oss-security/2015/06/25/2

  (Jul 13)
 

New upstream - Firefox 39.0

  (Jul 13)
 

Security fix for CVE-2015-3218, CVE-2015-3255, CVE-2015-3256, CVE-2015-4625

  (Jul 10)
 

This update brings security fix for two announced vulnerabilities. Namely XSECURITY restrictions bypass under certain conditions AND weakness of agent locking (ssh-add -x) to password guessing (more info in related bugs). It also provides new version of openssh-6.9 which is bringing many bugfixes and few new features with maintaining compatibility with previous version.

  (Jul 10)
 

Update to 2.13

  (Jul 10)
 

CVE-2015-0848 heap overflow when decoding BMP imagesCVE-2015-4588 RLE decoding doesn't check that the "count" fits into the imageCVE-2015-4695 meta_pen_create heap buffer overflowCVE-2015-4696 wmf2gd/wmf2eps use after free

  (Jul 10)
 

Update to 2.13

  (Jul 10)
 

This is an update to most recent version 10.0.20, that also fixes CVE-2015-3152.

  (Jul 10)
 

This update brings security fix for two announced vulnerabilities. Namely XSECURITY restrictions bypass under certain conditions AND weakness of agent locking (ssh-add -x) to password guessing (more info in related bugs). For more information see related bugs.

  (Jul 10)
 

* New upstream version (3.0.1.2): - cups-x2go{,.conf}: port to File::Temp. Use Text::ParseWords to split up the ps2pdf command line correctly. Don't use system() but IPC::Open2::open2(). Capture the ps2pdf program's stdout and write it to the temporary file handle "manually". Should fix problems reported by Jan Bi on IRC. - cups-x2go: fix commented out second ps2pdf definition to output PDF data to stdout. * New upstream version (3.0.1.3): - cups-x2go: import tempfile() function from File::Temp module. - cups-x2go: only repeat the last X, not the whole ".pdfX" string (or the like.) - cups-x2go: actually print "real" executed command instead of the "original" one with placeholders. - cups-x2go: read output from ghostscript, don't write a filehandle to the temporary file. Fixes a hanging ghostscript call and... well... random junk, instead of a "real" PDF file. - cups-x2go: use parentheses around function arguments. - cups-x2go: fix binmode() call, :raw layer is implicit. - cups-x2go: fix print call... Does not allow to separate parameters with a comma. - cups-x2go: add correct :raw layer to binmode calls. - cups-x2go: fix tiny typo. - cups-x2go: read data from GS and STDIN in chunks of 8 kbytes, instead of everything at once. Handles large print jobs gracefully. - cups-x2go: add parentheses to close() calls. - cups-x2go: delete PDF and title temporary files automatically. - cups-x2go: unlink PS temporary file on-demand in END block. Also move closelog to END block, because we want to print diagnosis messages in the END block. - cups-x2go: don't use unlink() explicitly. Trust File::Temp and our END block to clean up correctly. - cups-x2go: there is no continue in perl for stepping forward a loop. Still not. I keep forgetting that. Use next. (Partly) Fixes: #887. - cups-x2go: use the same temp file template for PS, PDF and title files. Use appropriate suffixes if necessary when generating PDF and title temp files. (Fully) Fixes: #887.Update to 3.0.1.1:- Add a short README that provides some getting started information.Update to 3.0.1.1:- Add a short README that provides some getting started information.


  (Jul 10)
 

A buffer overflow in libcapsinetwork might allow remote attackers to cause a Denial of Service condition.

  (Jul 10)
 

Multiple vulnerabilities have been found in MySQL, allowing attackers to execute arbitrary code or cause Denial of Service.

  (Jul 10)
 

Multiple vulnerabilities have been found in Chromium allowing remote attackers to bypass security restrictions.

  (Jul 10)
 

A vulnerability in SNMP could lead to Denial of Service condition.

  (Jul 10)
 

A vulnerability in Portage's urlopen function could allow a remote attacker to conduct a man-in-the-middle attack.

  (Jul 10)
 

Certain checks on untrusted certificates can be bypassed.

  (Jul 10)
 

Multiple vulnerabilities have been found in Oracle JRE/JDK, allowing both local and remote attackers to compromise various Java components.

  (Jul 10)
 

Multiple vulnerabilities have been found in Adobe Flash Player, the worst of which allows remote attackers to execute arbitrary code.

  (Jul 10)
 

A vulnerability in Perl allows a remote attacker to cause Denial of Service.

  (Jul 10)
 

A buffer overflow in t1utils could result in execution of arbitrary code or Denial of Service.

  (Jul 9)
 

A double free vulnerability in PyPAM could result in execution of arbitrary code or Denial of Service.


  Red Hat: 2015:1243-01: java-1.6.0-sun: Important Advisory (Jul 17)
 

Updated java-1.6.0-sun packages that fix several security issues are now available for Oracle Java for Red Hat Enterprise Linux 5, 6, and 7. Red Hat Product Security has rated this update as having Important security [More...]

  Red Hat: 2015:1242-01: java-1.7.0-oracle: Critical Advisory (Jul 17)
 

Updated java-1.7.0-oracle packages that fix several security issues are now available for Oracle Java for Red Hat Enterprise Linux 5, 6, and 7. Red Hat Product Security has rated this update as having Critical security [More...]

  Red Hat: 2015:1241-01: java-1.8.0-oracle: Critical Advisory (Jul 17)
 

Updated java-1.8.0-oracle packages that fix several security issues are now available for Oracle Java for Red Hat Enterprise Linux 6 and 7. Red Hat Product Security has rated this update as having Critical security [More...]

  Red Hat: 2015:1235-01: flash-plugin: Critical Advisory (Jul 16)
 

An updated Adobe Flash Player package that fixes two security issues is now available for Red Hat Enterprise Linux 5 and 6 Supplementary. Red Hat Product Security has rated this update as having Critical security [More...]

  Red Hat: 2015:1228-01: java-1.8.0-openjdk: Important Advisory (Jul 15)
 

Updated java-1.8.0-openjdk packages that fix multiple security issues are now available for Red Hat Enterprise Linux 6 and 7. Red Hat Product Security has rated this update as having Important security [More...]

  Red Hat: 2015:1229-01: java-1.7.0-openjdk: Critical Advisory (Jul 15)
 

Updated java-1.7.0-openjdk packages that fix multiple security issues are now available for Red Hat Enterprise Linux 6 and 7. Red Hat Product Security has rated this update as having Critical security [More...]

  Red Hat: 2015:1230-01: java-1.7.0-openjdk: Important Advisory (Jul 15)
 

Updated java-1.7.0-openjdk packages that fix multiple security issues are now available for Red Hat Enterprise Linux 5. Red Hat Product Security has rated this update as having Important security [More...]

  Red Hat: 2015:1221-01: kernel: Moderate Advisory (Jul 14)
 

Updated kernel packages that fix multiple security issues, several bugs, and add one enhancement are now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having Moderate security [More...]

  Red Hat: 2015:1219-01: php54-php: Moderate Advisory (Jul 9)
 

Updated php54-php packages that fix multiple security issues are now available for Red Hat Software Collections 2. Red Hat Product Security has rated this update as having Moderate security [More...]

  Red Hat: 2015:1218-01: php: Moderate Advisory (Jul 9)
 

Updated php packages that fix multiple security issues are now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having Moderate security [More...]


  (Jul 12)
 

New mozilla-thunderbird packages are available for Slackware 14.1 and -current to fix security issues. [More Info...]

  (Jul 9)
 

New openssl packages are available for Slackware 14.0, 14.1, and -current to fix a security issue. [More Info...]


  Ubuntu: 2656-2: Firefox vulnerabilities (Jul 15)
 

Firefox could be made to crash or run programs as your login if itopened a malicious website.

  Ubuntu: 2656-1: Firefox vulnerabilities (Jul 9)
 

Firefox could be made to crash or run programs as your login if itopened a malicious website.

  Ubuntu: 2672-1: NSS vulnerabilities (Jul 9)
 

Several security issues were fixed in NSS.

  Ubuntu: 2671-1: Django vulnerabilities (Jul 9)
 

Several security issues were fixed in Django.