Showing all newswire headlines
View by date, instead?« Previous ( 1 ... 7414 7415 7416 7417 7418 7419 7420 7421 7422 7423 7424 ... 7439 ) Next »
Red Hat alert: New kernel 2.4 packages are available
A vulnerability has been found in the ptrace code of the kernel (ptrace is
the part that allows program debuggers to run) that could be abused by
local users to gain root privileges.
Red Hat alert: New kernel 2.4 packages are available
A vulnerability has been found in the ptrace code of the kernel (ptrace is
the part that allows program debuggers to run) that could be abused by
local users to gain root privileges.
Debian alert: New gftp packages won't display the password
Stephane Gaudreault told us that version 2.0.6a of gftp displays the
password in plain text on the screen within the log window when it is
logging into an ftp server. A malicious collegue who is watching the
screen could gain access to the users shell on the remote machine.
Debian alert: No w3m packages for powerpc available
In SNS Advisory No. 32 a buffer overflow vulnerability has been
reported in the routine which parses MIME headers that are returned
from web servers. A malicious web server administrator could exploit
this and let the client web browser execute arbitrary code.
Debian alert: New procmail packages fix insecure signal handling
Using older versions of procmail it was possible to make procmail
crash by sending it signals. On systems where procmail is installed
setuid this could be exploited to obtain unauthorized privileges.
Debian alert: News Xvt packages fix buffer overflow
Christophe Bailleux reported on bugtraq that Xvt is vulnerable to a
buffer overflow in its argument handling. Since Xvt is installed
setuid root, it was possible for a normal user to pass
carefully-crafted arguments to xvt so that xvt executed a root shell.
Debian alert: New w3m packages fix buffer overflow
In SNS Advisory No. 32 a buffer overflow vulnerability has been
reported in the routine which parses MIME headers that are returned
from web servers. A malicious web server administrator could exploit
this and let the client web browser execute arbitrary code.
Debian alert: New ht://Dig packages fix vulnerability
Nergal reported a vulnerability in the htsearch program which is
distributed as part of the ht://Dig package, a indexing and searching
system for small domains or intranets. Using former versions it was
able to pass the parameter `-c' to the cgi program in order to use a
different configuration file.
Red Hat alert: New util-linux packages available to fix /bin/login pam problem
New util-linux packages are available that fix a problem with /bin/login's
PAM implementation. This could, in some non-default setups, cause users to
receive credentials of other users. It is recommended that all users
update to the fixed packages.
Red Hat alert: New util-linux packages available to fix /bin/login pam problem
New util-linux packages are available that fix a problem with /bin/login's
PAM implementation. This could, in some non-default setups, cause users to
receive credentials of other users. It is recommended that all users
update to the fixed packages.
Red Hat alert: Updated openssh packages available
Updated openssh packages are now available for Red Hat Linux 7 and 7.1.
These packages fix a vulnerability which may allow unauthorized users to
log in from hosts that have been denied access.
Red Hat alert: New Zope packages are available
New Zope packages are available which fix a security flaw with DTML
scripting.
SuSE alert: lprold
ISS X-Force reported an overflow in BSD's lineprinter daemon shipped with the lprold package in SuSE Linux.
Red Hat alert: New Samba packages available for Red Hat Linux 5.2, 6.2, 7 and 7.1
New Samba packages are available for Red Hat Linux 5.2, 6.2, 7, and 7.1.
These packages fix a security problem with remote clients giving special
NetBIOS names to the server.
It is recommended that all Samba users upgrade to the fixed packages.
Please note that the packages for Red Hat Linux 6.2 require an updated
logrotate package.
UPDATE: The packages for Red Hat Linux 5.2 have been updated. The original
packages detected the availability of syscalls present in kernels newer
than
Red Hat alert: New squid packages available to fix FTP-based DoS
New squid packages are available that fix a potential DoS in Squid's FTP
handling code. It is recommened that squid users update to the fixed
packages.
The packages for Red Hat Linux 6.2 also fix the problem described in
RHSA-2001:097-04; it was later discovered that Red Hat Linux 6.2 is
vulnerable to the same problem in accelerator-only mode.
Red Hat alert: Insecure setserial initscript
The initscript distributed with the setserial package (which is not
installed or enabled by default) uses predictable temporary file names, and
should not be used. setserial-
Red Hat alert: Insecure setserial initscript
The initscript distributed with the setserial package (which is not
installed or enabled by default) uses predictable temporary file names, and
should not be used. setserial-
Debian alert: New UUCP packages fix local exploit
zen-parse has found a problem with Taylor UUCP as distributed with
many GNU/Linux distributions. It was possible to make `uux' execute
`uucp' with malicious commandline arguments which gives an attacker
access to files owned by uid/gid uucp.
Debian alert: slrn command invocation
Byrial Jensen found a nasty problem in slrn (a threaded news reader).
The notice on slrn-announce describes it as follows:
Debian alert: squid FTP PUT problem
Vladimir Ivaschenko found a problem in squid (a popular proxy cache).
He discovered that there was a flaw in the code to handle FTP PUT
commands: when a mkdir-only request was done squid would detect
an internal error and exit. Since squid is configured to restart
itself on problems this is not a big problem.
« Previous ( 1 ... 7414 7415 7416 7417 7418 7419 7420 7421 7422 7423 7424 ... 7439 ) Next »