Showing all newswire headlines
View by date, instead?« Previous ( 1 ... 7447 7448 7449 7450 7451 7452 7453 7454 7455 7456 7457 ... 7468 ) Next »
Red Hat alert: Updated ispell packages available for Red Hat Linux 5.2 and 6.2
The ispell program uses mktemp() to open temporary files - this makes it
vulnerable to symlink attacks.
Red Hat alert: Updated xinetd package available for Red Hat Linux 7 and 7.1
Xinetd runs with umask 0 - this means that applications using the xinetd
umask and not setting the permissions themselves (like swat from the samba
package), will create world writable files.
Red Hat alert: Updated ispell packages available for Red Hat Linux 5.2 and 6.2
The ispell program uses mktemp() to open temporary files - this makes it
vulnerable to symlink attacks.
SuSE alert: gpg/GnuPG
GnuPG (the SuSE package is named "gpg") is a powerful encryption and signing program with a widespread usership in the free software world. It is designed to be a replacement for PGP and conforms to the OpenPGP standard.
SuSE alert: man
Two vulnerabilities have been found in the man package that is installed by default in all SuSE Linux distributions. The first error is a format string bug in the error handling routine of the man command that can allow a local attacker to gain the privileges of the user "man" on SuSE Linux systems (the man command in /usr/bin is installed setuid man). After getting write access to the /usr/bin/man binary, an attacker can place a cuckook's egg into the executable, waiting for root to view manpages. The second problem is a segmentation fault that can be caused by the options "-S ::: foo" to the man command. On other Linux distributions, this problem has been found exploitable. On SuSE and Debian systems, the code responsible for the bug is different from the one found in other distributions and is not exploitable. We consider the existence of this bug a beauty flaw that will be fixed in future releases of the SuSE Linux distribution, but the fix was not included in the man packages that can be found on our ftp server. Since the error() format string bug was discovered earlier than we announced that the SuSE Linux distributions 6.0, 6.1 and 6.2 will be discontinued, we also provide fixed packages for the said distributions for the i386 Intel architecture. We strongly encourage our usership to upgrade their systems to a newer distribution. Both bugs are fixed in the upcoming release of SuSE Linux 7.2.
Red Hat alert: Updated man package fixing security problems available
A heap overrun exists in the man packages shipped with Red Hat Linux
5.x, 6.x and 7.0.
Since man is setgid man, users could gain gid man privileges.
Red Hat Linux 7.1 is not affected by this problem.
Red Hat alert: Updated mktemp packages available
The version of mktemp shipped with Red Hat Linux prior to version 7 does
not support creating temporary directories.
SuSE alert: kernel
Multiple security vulnerabilities have been found in all Linux kernels
of version 2.2 before version 2.2.19. Most of the found errors allow
a local attacker to gain root privileges. None of the found errors
in the v2.2 linux kernel make it possible for a remote attacker to
gain access to the system or to elevate privileges from the outside
of the system.
Red Hat alert: Updated Kerberos 5 packages available
Updated Kerberos 5 packages are now available for Red Hat Linux 6.2, 7,
and 7.1. These updates close a potential vulnerability present in the
gssapi-aware ftpd included in the krb5-workstation package.
Red Hat alert: Updated gnupg packages available
Updated gnupg packages are now available for Red Hat Linux 6.2, 7, and 7.1.
These updates address a potential vulnerability which could allow an
attacker to compute a user's secret key.
SuSE alert: cron
The crontab program is running setuser-id root and invokes the editor specified in the EDITOR environment variable, usually vi. If crontab discovers that the format of the edited file is incorrect, it executes the editor again but fails to drop its root privileges before. Therefore it is possible to execute arbitrary commands as root. It has been fixed by properly dropping the privileges before executing the editor. This bug was found by Sebastian Krahmer.
SuSE alert: cron
The crontab program is running setuser-id root and invokes the editor specified in the EDITOR environment variable, usually vi. If crontab discovers that the format of the edited file is incorrect, it executes the editor again but fails to drop its root privileges before. Therefore it is possible to execute arbitrary commands as root. Sebastian Krahmer has found the bug. It has been fixed by properly dropping the privileges before executing the editor.
Red Hat alert: New samba packages available to fix /tmp races
New samba packages are available; these packages fix /tmp races
in smbclient and the printing code. By exploiting these vulnerabilities,
local users could overwrite any file in the system.
It is recommended that all samba users upgrade to the fixed packages.
Please note that the packages for Red Hat Linux 6.2 require an updated
logrotate package.
Note: these packages include the security patch from Samba-
Red Hat alert: New samba packages available to fix /tmp races
New samba packages are available; these packages fix /tmp races
in smbclient and the printing code. By exploiting these vulnerabilities,
local users could overwrite any file in the system.
It is recommended that all samba users upgrade to the fixed packages.
Please note that the packages for Red Hat Linux 6.2 require an updated
logrotate package.
Note: these packages include the security patch from Samba-
Red Hat alert: New Zope packages are available
New Zope packages are available which fix a security flaw with ZClass.
Red Hat alert: New Zope packages are available
New Zope packages are available which fix a security flaw with ZClass.
Red Hat alert: Updated minicom packages available
The minicom program allows any user with local shell access to obtain
group uucp priveledges. It may also be possible for the malicious user
to obtain root priveledges as well.
Red Hat alert: Updated minicom packages available
The minicom program allows any user with local shell access to obtain
group uucp priveledges. It may also be possible for the malicious user
to obtain root priveledges as well.
Debian alert: samba security fix update
Marc Jacobsen from HP discovered that the security fixes from samba
2.0.8 did not fully fix the /tmp symlink attack problem. The samba
team released version 2.0.9 to fix that, and those fixes have been
added to version 2.0.7-3.3 of the Debian samba packages.
Red Hat alert: Updated nedit packages available
Updated nedit packages fixing a security problem are available.
« Previous ( 1 ... 7447 7448 7449 7450 7451 7452 7453 7454 7455 7456 7457 ... 7468 ) Next »