Thank you for reading the Linux Advisory Watch Security Newsletter. The purpose of this document is to provide our readers with a quick summary of each week's vendor security bulletins and pointers on methods to improve the security posture of your open source system. Vulnerabilities affect nearly every vendor virtually every week, so be sure to read through to find the updates your distributor have made available.

LinuxSecurity.com Feature Extras:

Using the sec-wall Security Proxy - This article full of examples will show you various ways to test services secured using sec-wall, a feature-packed high performance security proxy. We'll be using cURL, a popular Linux command line tool and PycURL - a Python interface to cURL. As of version 1.0, sec-wall supports HTTP Basic auth, digest auth, custom HTTP headers, XPath-based authentication, WS-Security & SSL/TLS client certificates and each of the options is being shown below.

sec-wall: Open Source Security Proxy - sec-wall, a recently released security proxy is a one-stop place for everything related to securing HTTP/HTTPS traffic. Designed as a pragmatic solution to the question of securing servers using SSL/TLS certificates, WS-Security, HTTP Basic/Digest Auth, custom HTTP headers, XPath expressions with an option of modifying HTTP headers and URLs on the fly.


(Dec 9)

Guardian Digital is happy to announce the release of EnGarde Secure Community 3.0.22 (Version 3.0, Release 22). This release includes many updated packages and bug fixes and some feature enhancements to the EnGarde Secure Linux Installer and the SELinux policy.


(Jun 20)

Mark Martinec discovered that Perl incorrectly clears the tainted flag on values returned by case conversion functions such as "lc". This may expose preexisting vulnerabilities in applications which use these functions while processing untrusted input. No such applications are [More...]

(Jun 18)

Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leak. The Common Vulnerabilities and Exposures project identifies the following problems: [More...]

(Jun 16)

It was discovered that Movable Type, a weblog publishing system, contains several security vulnerabilities: A remote attacker could execute arbitrary code in a logged-in users' [More...]


Mandriva: 2011:111: mozilla (Jun 22)

Security issues were identified and fixed in mozilla firefox and thunderbird: Security researcher regenrecht reported via TippingPoint's Zero Day Initiative two instances of code which modifies SVG element lists [More...]

Mandriva: 2011:111: mozilla (Jun 22)

Security issues were identified and fixed in mozilla firefox and thunderbird: Security researcher regenrecht reported via TippingPoint's Zero Day Initiative two instances of code which modifies SVG element lists [More...]

Mandriva: 2011:110: gimp (Jun 17)

A vulnerability was discovered and corrected in gimp: Multiple integer overflows in the load_image function in file-pcx.c in the Personal Computer Exchange (PCX) plugin in GIMP 2.6.x and earlier allow remote attackers to cause a denial of service (application [More...]


Red Hat: 2011:0883-01: kernel: Important Advisory (Jun 21)

Updated kernel packages that fix several security issues and three bugs are now available for Red Hat Enterprise Linux 6.0 Extended Update Support. The Red Hat Security Response Team has rated this update as having [More...]

Red Hat: 2011:0888-01: seamonkey: Critical Advisory (Jun 21)

Updated seamonkey packages that fix several security issues are now available for Red Hat Enterprise Linux 4. The Red Hat Security Response Team has rated this update as having critical [More...]

Red Hat: 2011:0887-01: thunderbird: Critical Advisory (Jun 21)

An updated thunderbird package that fixes several security issues is now available for Red Hat Enterprise Linux 4 and 5. The Red Hat Security Response Team has rated this update as having critical [More...]

Red Hat: 2011:0885-01: firefox: Critical Advisory (Jun 21)

Updated firefox packages that fix several security issues and one bug are now available for Red Hat Enterprise Linux 4, 5, and 6. The Red Hat Security Response Team has rated this update as having critical [More...]

Red Hat: 2011:0886-01: thunderbird: Critical Advisory (Jun 21)

An updated thunderbird package that fixes several security issues is now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having critical [More...]


(Jun 20)

New fetchmail packages are available for Slackware 8.1, 9.0, 9.1, 10.0, 10.1, 10.2, 11.0, 12.0, 12.1, 12.2, 13.0, 13.1, 13.37, and -current to fix a security issue. [More Info...]


Ubuntu: 1149-1: Firefox and Xulrunner vulnerabilities (Jun 22)

Multiple Vulnerabilities were fixed in Firefox and Xulrunner

Ubuntu: 1157-2: mozvoikko, ubufox, webfav update (Jun 22)

This update provides provides packages compatible with Firefox 5.

Ubuntu: 1157-1: Firefox vulnerabilities (Jun 22)

Multiple Firefox vulnerabilities have been fixed

Ubuntu: 1156-1: tgt vulnerabilities (Jun 21)

An attacker could send crafted input to tgt and cause it to crash or runarbitrary programs.

Ubuntu: 1155-1: NBD vulnerability (Jun 21)

An attacker could send crafted input to NBD and cause it to crash or to runarbitrary programs.

Ubuntu: 1154-1: OpenJDK 6 vulnerabilities (Jun 17)

Multiple OpenJDK 6 vulnerabilities have been fixed.


Pardus: 2011-87: ffmpeg: Code Execution (Jun 21)

A vulnerability has been fixed in ffmpeg, which can be result in an out of array write and potentially arbitrary code execution.

Pardus: 2011-88: php: Stack-based Buffer Overflow (Jun 21)

A vulnerability has been fixed in php,, which might allow context-dependent attackers to execute arbitrary code.

Pardus: 2011-86: klibc: Insecure Temporary File (Jun 21)

A vulnerability has been fixed in klibc, which allows attackers to injection command.

Pardus: 2011-85: Logrotate: Race Condition (Jun 21)

A vulnerability has been fixed in logrotate, which allows local attackers could use this flaw to trick the logrotate utility into creating the compressed or copied file.

Pardus: 2011-84: postfix: Heap-Based Buffer Overread (Jun 21)

A vulnerability has been fixed in postfix, which allows remote attackers to cause a denial of service .

Pardus: 2011-82: Tiff: Integer Overflow (Jun 21)

A vulnerability has been fixed in tiff, which allows attackers to denial of service.

Pardus: 2011-83: glibc: Multible Vulnerabilities (Jun 21)

Multible vulnerabilities have been fixed in glibc.

Pardus: 2011-81: Dovecot: man-in-the-middle attack (Jun 21)

A vulnerability has been found in Dovecot, which can be used by man-in-the-middle attackers to spoof arbitrary SSL servers.