Showing all newswire headlines

View by date, instead?

« Previous ( 1 ... 7447 7448 7449 7450 7451 7452 7453 7454 7455 7456 7457 ... 7468 ) Next »

Red Hat alert: Updated ispell packages available for Red Hat Linux 5.2 and 6.2

  • Mailing list (Posted by dave on Jun 5, 2001 3:20 PM EDT)
  • Story Type: Security; Groups: Red Hat
The ispell program uses mktemp() to open temporary files - this makes it vulnerable to symlink attacks.

Red Hat alert: Updated xinetd package available for Red Hat Linux 7 and 7.1

  • Mailing list (Posted by dave on Jun 5, 2001 3:20 PM EDT)
  • Story Type: Security; Groups: Red Hat
Xinetd runs with umask 0 - this means that applications using the xinetd umask and not setting the permissions themselves (like swat from the samba package), will create world writable files.

Red Hat alert: Updated ispell packages available for Red Hat Linux 5.2 and 6.2

  • Mailing list (Posted by dave on Jun 5, 2001 3:20 PM EDT)
  • Story Type: Security; Groups: Red Hat
The ispell program uses mktemp() to open temporary files - this makes it vulnerable to symlink attacks.

SuSE alert: gpg/GnuPG

  • Mailing list (Posted by dave on Jun 3, 2001 4:23 AM EDT)
  • Story Type: Security; Groups: SUSE
GnuPG (the SuSE package is named "gpg") is a powerful encryption and signing program with a widespread usership in the free software world. It is designed to be a replacement for PGP and conforms to the OpenPGP standard.

SuSE alert: man

  • Mailing list (Posted by dave on May 29, 2001 10:46 AM EDT)
  • Story Type: Security; Groups: SUSE
Two vulnerabilities have been found in the man package that is installed by default in all SuSE Linux distributions. The first error is a format string bug in the error handling routine of the man command that can allow a local attacker to gain the privileges of the user "man" on SuSE Linux systems (the man command in /usr/bin is installed setuid man). After getting write access to the /usr/bin/man binary, an attacker can place a cuckook's egg into the executable, waiting for root to view manpages. The second problem is a segmentation fault that can be caused by the options "-S ::: foo" to the man command. On other Linux distributions, this problem has been found exploitable. On SuSE and Debian systems, the code responsible for the bug is different from the one found in other distributions and is not exploitable. We consider the existence of this bug a beauty flaw that will be fixed in future releases of the SuSE Linux distribution, but the fix was not included in the man packages that can be found on our ftp server. Since the error() format string bug was discovered earlier than we announced that the SuSE Linux distributions 6.0, 6.1 and 6.2 will be discontinued, we also provide fixed packages for the said distributions for the i386 Intel architecture. We strongly encourage our usership to upgrade their systems to a newer distribution. Both bugs are fixed in the upcoming release of SuSE Linux 7.2.

Red Hat alert: Updated man package fixing security problems available

  • Mailing list (Posted by dave on May 21, 2001 10:40 AM EDT)
  • Story Type: Security; Groups: Red Hat
A heap overrun exists in the man packages shipped with Red Hat Linux 5.x, 6.x and 7.0. Since man is setgid man, users could gain gid man privileges. Red Hat Linux 7.1 is not affected by this problem.

Red Hat alert: Updated mktemp packages available

  • Mailing list (Posted by dave on May 21, 2001 10:35 AM EDT)
  • Story Type: Security; Groups: Red Hat
The version of mktemp shipped with Red Hat Linux prior to version 7 does not support creating temporary directories.

SuSE alert: kernel

  • Mailing list (Posted by dave on May 17, 2001 6:41 AM EDT)
  • Story Type: Security; Groups: SUSE
Multiple security vulnerabilities have been found in all Linux kernels of version 2.2 before version 2.2.19. Most of the found errors allow a local attacker to gain root privileges. None of the found errors in the v2.2 linux kernel make it possible for a remote attacker to gain access to the system or to elevate privileges from the outside of the system.

Red Hat alert: Updated Kerberos 5 packages available

  • Mailing list (Posted by dave on May 16, 2001 5:35 PM EDT)
  • Story Type: Security; Groups: Red Hat
Updated Kerberos 5 packages are now available for Red Hat Linux 6.2, 7, and 7.1. These updates close a potential vulnerability present in the gssapi-aware ftpd included in the krb5-workstation package.

Red Hat alert: Updated gnupg packages available

  • Mailing list (Posted by dave on May 16, 2001 5:35 PM EDT)
  • Story Type: Security; Groups: Red Hat
Updated gnupg packages are now available for Red Hat Linux 6.2, 7, and 7.1. These updates address a potential vulnerability which could allow an attacker to compute a user's secret key.

SuSE alert: cron

  • Mailing list (Posted by dave on May 15, 2001 5:50 AM EDT)
  • Story Type: Security; Groups: SUSE
The crontab program is running setuser-id root and invokes the editor specified in the EDITOR environment variable, usually vi. If crontab discovers that the format of the edited file is incorrect, it executes the editor again but fails to drop its root privileges before. Therefore it is possible to execute arbitrary commands as root. It has been fixed by properly dropping the privileges before executing the editor. This bug was found by Sebastian Krahmer.

SuSE alert: cron

  • Mailing list (Posted by dave on May 15, 2001 4:48 AM EDT)
  • Story Type: Security; Groups: SUSE
The crontab program is running setuser-id root and invokes the editor specified in the EDITOR environment variable, usually vi. If crontab discovers that the format of the edited file is incorrect, it executes the editor again but fails to drop its root privileges before. Therefore it is possible to execute arbitrary commands as root. Sebastian Krahmer has found the bug. It has been fixed by properly dropping the privileges before executing the editor.

Red Hat alert: New samba packages available to fix /tmp races

  • Mailing list (Posted by dave on May 14, 2001 6:20 PM EDT)
  • Story Type: Security; Groups: Red Hat
New samba packages are available; these packages fix /tmp races in smbclient and the printing code. By exploiting these vulnerabilities, local users could overwrite any file in the system. It is recommended that all samba users upgrade to the fixed packages. Please note that the packages for Red Hat Linux 6.2 require an updated logrotate package. Note: these packages include the security patch from Samba-

Red Hat alert: New samba packages available to fix /tmp races

  • Mailing list (Posted by dave on May 14, 2001 6:20 PM EDT)
  • Story Type: Security; Groups: Red Hat
New samba packages are available; these packages fix /tmp races in smbclient and the printing code. By exploiting these vulnerabilities, local users could overwrite any file in the system. It is recommended that all samba users upgrade to the fixed packages. Please note that the packages for Red Hat Linux 6.2 require an updated logrotate package. Note: these packages include the security patch from Samba-

Red Hat alert: New Zope packages are available

  • Mailing list (Posted by dave on May 14, 2001 3:41 PM EDT)
  • Story Type: Security; Groups: Red Hat
New Zope packages are available which fix a security flaw with ZClass.

Red Hat alert: New Zope packages are available

  • Mailing list (Posted by dave on May 14, 2001 3:41 PM EDT)
  • Story Type: Security; Groups: Red Hat
New Zope packages are available which fix a security flaw with ZClass.

Red Hat alert: Updated minicom packages available

  • Mailing list (Posted by dave on May 10, 2001 11:19 AM EDT)
  • Story Type: Security; Groups: Red Hat
The minicom program allows any user with local shell access to obtain group uucp priveledges. It may also be possible for the malicious user to obtain root priveledges as well.

Red Hat alert: Updated minicom packages available

  • Mailing list (Posted by dave on May 10, 2001 11:19 AM EDT)
  • Story Type: Security; Groups: Red Hat
The minicom program allows any user with local shell access to obtain group uucp priveledges. It may also be possible for the malicious user to obtain root priveledges as well.

Debian alert: samba security fix update

  • Mailing list (Posted by dave on May 9, 2001 6:06 AM EDT)
  • Story Type: Security; Groups: Debian
Marc Jacobsen from HP discovered that the security fixes from samba 2.0.8 did not fully fix the /tmp symlink attack problem. The samba team released version 2.0.9 to fix that, and those fixes have been added to version 2.0.7-3.3 of the Debian samba packages.

Red Hat alert: Updated nedit packages available

  • Mailing list (Posted by dave on May 8, 2001 6:08 AM EDT)
  • Story Type: Security; Groups: Red Hat
Updated nedit packages fixing a security problem are available.

« Previous ( 1 ... 7447 7448 7449 7450 7451 7452 7453 7454 7455 7456 7457 ... 7468 ) Next »