Showing all newswire headlines
View by date, instead?« Previous ( 1 ... 7243 7244 7245 7246 7247 7248 7249 7250 7251 7252 7253 ... 7254 ) Next »
SuSE alert: modules
The modules package is responsible for on-demand loading of kernel modules/drivers. The /sbin/modprobe command, when executed as a new task by the kernel-internal function request_module(), runs with the priviledges of the init process, usually root. Newer versions of the modprobe program contain a bug which allows local users to gain root priviledges. modprobe expands given arguments via /bin/echo and can easily be tricked into executing commands. In order for this bug to be exploitable, a setuid root program must be installed that can trigger the loading of modules (such as ping6).
Debian alert: New version of Debian bind packages released
The version of BIND shipped with Debian GNU/Linux 2.2 is vulnerable to
a remote denial of service attack, which can cause the nameserver to crash
after accessing an uninitialized pointer. This problem is fixed in the current
maintenance release of BIND, 8.2.2P7, and in the Debian package version
8.2.2p7-1 for both stable and unstable releases.
Red Hat alert: Updated bind packages fixing DoS attack available
A remote DoS (denial of service) attack is possible with bind versions
prior to 8.
Debian alert: New version of tcsh released
Proton reported on bugtraq that tcsh did not handle in-here documents
correctly. The version of tcsh that is distributed with Debian GNU/Linux
2.2r0 also suffered from this problem.
Debian alert: New version of gnupg installed
The version of gnupg that was distributed in Debian GNU/Linux 2.2 had
a logic error in the code that checks for valid signatures which could
cause false positive results: Jim Small discovered that if the input
contained multiple signed sections the exit-code gnupg returned was
only valid for the last section, so improperly signed other sections
were not noticed.
Red Hat alert: Updated pine and imap packages are available for Red Hat Linux 5.2, 6.x and 7
Updated pine and imap packages are available for Red Hat Linux 5.2, 6.x and
7.
Red Hat alert: Updated usermode packages available
Updated usermode packages are now available for Red Hat Linux 6.x and 7.
Red Hat alert: Updated gnorpm packages are available for Red Hat Linux 6.1, 6.2, and 7.0
(This is a re-release of the previous errata caused by a missing patch).
A locally-exploitable security hole was found where a normal user could
trick root running GnoRPM into writing to arbitrary files due to a bug in
the gnorpm tmp file handling.
Red Hat alert: Setuid bits are removed on dump to prevent exploit
The Red Hat 7.0 dump is being released for Red Hat 6.x and Red Hat 5.x
in order to remove root setuid bits to prevent a known dump
exploit (#20111).
The new dump packages also include a fix for a buffer overflow (#9899)
Red Hat alert: Updated nss_ldap packages are now available.
Updated nss_ldap packages are now available for Red Hat Linux 6.1, 6.2, and
7.
Red Hat alert: Updated Secure Web Server packages now available
Updated Secure Web Server packages are now available for users of Secure
Web Server 3.
SuSE alert: ncurses
The ncurses library is used by many text/console based applications such as mail user agents, ftp clients and other command line utilities. A vulnerability has been found by Jouko Pynnönen <jouko@solutions.fi> in the screen handling functions: Insufficient boundary checking leads to a buffer overflow if a user supplies a specially drafted terminfo database file. If an ncurses-linked binary is installed setuid root, it is possible for a local attacker to exploit this hole and gain elevated privileges.
Red Hat alert: Updated cyrus-sasl packages available for Red Hat Linux 7
Updated cyrus-sasl packages are now available for Red Hat Linux 7.
Slackware alert: Local /tmp vulnerability fixed in ppp-off
A local /tmp bug in the /usr/sbin/ppp-off program was found. This bug
could allow a local user to corrupt system files. A fix has been made and
an updated package is now available in the -current branch.
Slackware alert: root exploit with xlockmore fixed
A root exploit has been found in xlockmore packaged with Slackware. By
providing a carefully crafted display variable to xlock, it is possible
for a local attacker to gain root access. Anyone running xlock on a
public machine should upgrade to this version of xlock (or disable xlock
altogether) immediately.
Red Hat alert: Updated apache, php, mod_perl, and auth_ldap packages available.
Updated apache, php, mod_perl, and auth_ldap packages are now available for
Red Hat Linux 5.2, 6.0, 6.1, 6.2, and 7.
Red Hat alert: ypbind for Red Hat Linux 5.x, 6.x has a local root exploit
ypbind as shipped in Red Hat Linux 5.x and 6.x is vulnerable to a local
root exploit. All systems making use of NIS services are encouraged to
upgrade.
Red Hat alert: Updated gnupg packages available
Updated gnupg packages are now available for Red Hat Linux 6.2 and 7.
SuSE alert: ypbind/ypclient
Security problems have been found in the client code of the NIS (Network Information System, aka yp - yellow pages) subsytem. SuSE distributions before SuSE-6.1 came with the original ypbind program, SuSE-6.2 and later included the ypbind-mt NIS client implementation. ypbind-3.3 (the earlier version) has a format string parsing bug if it is run in debug mode, and (discovered by Olaf Kirch <okir@caldera.de>) leaks file descriptors under certain circumstances which can lead to a DoS. In addition, ypbind-3.3 may suffer from buffer overflows. ypbind-mt, the software shipped with SuSE distributions starting with SuSE-6.2, suffers from a single format string parsing bug. Some of these bugs could allow remote attackers to execute arbitrary code as root. During code audit and testing it turned out that the ypbind-3.x software in the SuSE-6.1 distribution and earlier needs a major overhaul to make it work both reliable and secure with respect to errors in the code. Basically, this is what happened when Thorsten Kukuk <kukuk@suse.de> wrote ypbind-mt from scratch in 1998. For the same reason, we are currently unable to produce a working security update package which fixes the known and yet unknown (there may be more) problems in the ypclient packages in the SuSE-6.1 distribution and older. The only efficient workaround for the SuSE-6.1 distribution and older against these bugs for an untrusted, hostile environment is to upgrade to a new distribution base (SuSE-7.0 is recommended) and use the ypclient update packages for this distribution. As of today, there is no exploit known to exist in the wild.
« Previous ( 1 ... 7243 7244 7245 7246 7247 7248 7249 7250 7251 7252 7253 ... 7254 ) Next »