Showing all newswire headlines
View by date, instead?« Previous ( 1 ... 7430 7431 7432 7433 7434 7435 7436 7437 7438 ... 7439 ) Next »
Red Hat alert: lpr has a format string security bug, LPRng compat issues, and a race cond.
lpr has a format string security bug. It also mishandles any extension to
the lpd communication protocol, and assumes that the instructions contained
in the extension are a file it should try to print. It also has a race
condition in the handling of queue interactions that can cause the queue to
wedge.
Note: Packages indicated in revision -03 and earlier were not signed with
the Red Hat GPG key. This has been corrected.
Red Hat alert: lpr has a format string security bug, LPRng compat issues, and a race cond.
lpr has a format string security bug. It also mishandles any extension to
the lpd communication protocol, and assumes that the instructions contained
in the extension are a file it should try to print. It also has a race
condition in the handling of queue interactions that can cause the queue to
wedge.
Red Hat alert: LPRng contains a critical string format bug
LPRng has a string format bug in the use_syslog function which could lead
to root compromise.
Slackware alert: wuftpd vulnerability - Slackware 4.0, 7.0, 7.1, -current
A vulnerability involving an input validation error in the "site exec"
command has recently been identified in the wu-ftpd program (CERT Advisory
CA-2000-13).
SuSE alert: Crypto packages for 7.0
Many customers have asked to publish the packages of the SuSE-7.0
distribution that are not included in the US version due to US crypto
regulations.
Debian alert: Security policy for Debian 2.1 (slink) (updated)
We value your input during this transitional phase. Please direct your
comments to feedback@security.debian.org
Red Hat alert: glint symlink vulnerability
glint blindly follows a symlink in /tmp, overwriting the target file, so it
can conceivably be used to destroy any file on the system.
SuSE alert: syslogd/klogd
The syslogd package consists of two daemons that are being launched upon system startup: klogd and syslogd. The former collects kernel messages and passes them on to the syslog(3) facility. syslogd will pick up the logging messages and write them to the logfiles as specified by the syslogd configuration file /etc/syslog.conf. Errors in both the klogd and the syslogd can cause both daemons do die when specially designed strings get passed to the kernel by the user, eg. with a malformed structure in a system call. These errors have been discovered by Jouko Pynnönen, Solar Designer, a fix for one of the bugs has been provided by Daniel Jacobowitz.
Debian alert: New versions of sysklogd released
Multiple vulnerabilities have been reported in syslogd and klogd. A
local root exploit is possible, and remote exploits may be possible in
some cases (though we are not currently aware of a remote exploit.)
Slackware alert: klogd Kernel Logger vulnerability and fix
A string format / buffer overflow bug has been discovered in klogd, the kernel
logging daemon. Please upgrade to the new sysklogd 1.4 package available on
the Slackware FTP site.
Red Hat alert: syslog format vulnerability in klogd
Various vulnerabilities exist in syslogd/klogd. By exploiting these
vulnerabilities, it could be possible for local users to gain root
access. No remote exploit exists at this time, but it remains
theoretically possible that this vulnerability could be exploited
remotely under certain rare circumstances.
All users should upgrade to the new sysklogd packages. Users of
Red Hat Linux 6.0 and 6.1 should use the packages for Red Hat
Linux 6.
Debian alert: Security update policy for Debian 2.1 (slink)
We would appreciate hearing whether we have allowed enough time for the
slink->potato transition. Please direct your comments to
feedback@security.debian.org
Red Hat alert: Format string exploit in screen
Security hole in screen in Red Hat Linux 5.2 and earlier releases
Slackware alert: xchat input validation bug fixed
An input validation bug was found to affect Slackware Linux 7.0, 7.1, and
-current.
Red Hat alert: xpdf bugfix release
Security problem in temporary file and malicious URL.
SuSE alert: pam_smb
pam_smb is a package for a PAM (Pluggable Authentication Modules) module that allows Linux/Unix user authentication using a Windows NT server. Versions 1.1.5 and before contain a buffer overflow that would allow a remote attacker to gain root access on the target host, provided that the target host has the module installed and configured. The bug was found by Shaun Clowes <shaun@securereality.com.au>, and a new, fixed version of the package was promptly published by Dave Airlie <airlied@samba.org>, the author of the pam_smb package.
Debian alert: New version of libpam-smb released
libpam-smb contains a buffer overflow that can be used to execute
arbitrary commands with root privilege. libpam-smb was not shipped with
Debian 2.1 (slink), but was included in Debian 2.2 (potato).
Red Hat alert: Updated mgetty packages are now available.
The mgetty-sendfax package contains a vulnerability which allows any
user with access to the /var/tmp directory to destroy any file on any
mounted filesystem.
Debian alert: New version of xpdf released
xpdf as distributed in Debian GNU/Linux 2.2 suffered from two problems:
1. creation of temporary files was not done safely which made xpdf
vulnerable to a symlink attack.
2. when handling URLs in documents no checking was done for shell
metacharacters before starting the browser. This makes it possible
to construct a document which cause xpdf to run arbitrary commands
when the user views an URL.
Debian alert: New version of horde and imp released
imp as distributed in Debian GNU/Linux 2.2 suffered from insufficient
checking of user supplied data: the IMP webmail interface did not check
the $from variable which contains the sender address for shell
metacharacters. This could be used to run arbitrary commands on the
server running imp.
« Previous ( 1 ... 7430 7431 7432 7433 7434 7435 7436 7437 7438 ... 7439 ) Next »