Showing all newswire headlines

View by date, instead?

« Previous ( 1 ... 7462 7463 7464 7465 7466 7467 ... 7468 ) Next »

SuSE alert: SuSE Security: miscellaneous

  • Mailing list (Posted by dave on Aug 3, 2000 2:01 PM EDT)
  • Story Type: Security; Groups: SUSE
This notice addresses the latest security advisories from various Linux Vendors as well as private contributors.

Debian alert: New verion of dhcp released (updated)

  • Mailing list (Posted by dave on Jul 28, 2000 6:17 AM EDT)
  • Story Type: Security; Groups: Debian
The versions of the ISC DHCP client in debian 2.1 (slink) and debian 2.2 (potato) are vulnerable to a root exploit. The OpenBSD team reports that the client inappropriately executes commands embedded in replies sent from a dhcp server. This means that a malicious dhcp server can execute commands on the client with root privilages. A previous Debian security advisory addressed this issue with package versions 2.0b1pl6-0.3 and 2.0-3potato1, but ISC has released a newer patch since the original advisory. You should install the latest packages even if you upgraded when the last advisory was released.

Debian alert: New version of userv released

  • Mailing list (Posted by dave on Jul 26, 2000 6:41 PM EDT)
  • Story Type: Security; Groups: Debian
The version of userv that was distributed with Debian GNU/Linux 2.1 / slink had a problem in the fd swapping algorithm: it could sometimes make an out-of-bounds array reference. It might be possible for local users to abuse this to carry out unauthorised actions or be able to take control for service user accounts.

Red Hat alert: Revised advisory: Updated package for nfs-utils available

  • Mailing list (Posted by dave on Jul 21, 2000 8:09 AM EDT)
  • Story Type: Security; Groups: Red Hat
This is an updated of RHSA-2000:043 that contains further upgrade instructions. The rpc.statd daemon in the nfs-utils package shipped in Red Hat Linux 6.0, 6.1, and 6.2 contains a flaw that could lead to a remote root break-in.

Red Hat alert: Revised advisory: Updated package for nfs-utils available

  • Mailing list (Posted by dave on Jul 21, 2000 8:09 AM EDT)
  • Story Type: Security; Groups: Red Hat
This is an updated of RHSA-2000:043 that contains further upgrade instructions. The rpc.statd daemon in the nfs-utils package shipped in Red Hat Linux 6.0, 6.1, and 6.2 contains a flaw that could lead to a remote root break-in.

SuSE alert: nkitb

  • Mailing list (Posted by dave on Jul 16, 2000 9:51 PM EDT)
  • Story Type: Security; Groups: SUSE
The standard ftp server does directly pass untrusted data from a DNS server to the setproctitle() function in a unsecure manner.

Debian alert: New Debian nfs-common packages released

  • Mailing list (Posted by dave on Jul 16, 2000 6:41 PM EDT)
  • Story Type: Security; Groups: Debian
The version of nfs-common distributed in Debian GNU/Linux 2.2 (a.k.a potato), as well as in the unstable (woody) distribution, is vulnerable to a remote root compromise. No exploit is known to exist in the wild, but the vulnerability has been verified. This has been fixed in version 0.1.9.1-1 of the nfs-common package. We recommend that you update nfs-common immediately.

Debian alert: New version of cvsweb released

  • Mailing list (Posted by dave on Jul 15, 2000 10:40 PM EDT)
  • Story Type: Security; Groups: Debian
The versions of cvsweb distributed in Debian GNU/Linux 2.1 (aka slink) as well as in the frozen (potato) and unstable (woody) distributions, are vulnerable to a remote shell exploit. An attacker with write access to the cvs repository can execute arbitrary code on the server, as the www-data user.

SuSE alert: dhclient

  • Mailing list (Posted by dave on Jul 11, 2000 5:54 AM EDT)
  • Story Type: Security; Groups: SUSE
The client side program of the ISC DHCP package, dhclient, does not do quoting of server messages before passing them to /sbin/dhclient-script. This script is executed with root privileges.

SuSE alert: tnef

  • Mailing list (Posted by dave on Jul 11, 2000 5:51 AM EDT)
  • Story Type: Security; Groups: SUSE
Tnef extracts eMails compressed with MS-Outlook. The compressed file includes the path name to which the decompressed data should be written.

SuSE alert: makewhatis bug

  • Mailing list (Posted by dave on Jul 10, 2000 7:50 AM EDT)
  • Story Type: Security; Groups: SUSE
a few days ago a /tmp race condition bug in the makewhatis program was posted on bugtraq. We are NOT vulnerable by this bug, because we use different code, which doesn't touch /tmp in a unsecure way.

Red Hat alert: man package's 'makewhatis' uses insecure handling of files in /tmp

  • Mailing list (Posted by dave on Jul 3, 2000 3:03 PM EDT)
  • Story Type: Security; Groups: Red Hat
The makewhatis portion of the man package used files in /tmp in an insecure fashion. It was possible for local users to exploit this vulnerability to modify files that they normally could not and gain elevated privilege.

Debian alert: New version of canna released.

  • Mailing list (Posted by dave on Jul 2, 2000 5:34 AM EDT)
  • Story Type: Security; Groups: Debian
The canna package as distributed in Debian GNU/Linux 2.1 can be remotely exploited to gain access. This could be done by overflowing a buffer by sending a SR_INIT command with a very long usernamd or groupname.

Debian alert: New verion of dhcp released

  • Mailing list (Posted by dave on Jun 28, 2000 8:18 AM EDT)
  • Story Type: Security; Groups: Debian
The versions of the ISC DHCP client in debian 2.1 (slink) and debian 2.2 (potato) are vulnerable to a root exploit. The OpenBSD team reports that the client inappropriately executes commands embedded in replies sent from a dhcp server. This means that a malicious dhcp server can execute commands on the client with root privilages.

SuSE alert: Problems after Kernel Update

  • Mailing list (Posted by dave on Jun 28, 2000 5:43 AM EDT)
  • Story Type: Security; Groups: SUSE
alot of customers report problems after updateing the kernel. Please, execute 'mk_initrd' and 'lilo' after upgrading the kernel.

Slackware alert: wu-ftpd remote exploit patched

A remote exploit has been found in the FTP daemon, wu-ftpd. This can allow an attacker full access to your machine.

SuSE alert: kernel-2.2.x

  • Mailing list (Posted by dave on Jun 27, 2000 8:42 AM EDT)
  • Story Type: Security; Groups: SUSE
The implementation of the capability feature of the kernel

SuSE alert: wuftpd-2.6

  • Mailing list (Posted by dave on Jun 27, 2000 8:27 AM EDT)
  • Story Type: Security; Groups: SUSE
The wu-ftp FTP server does not do proper bounds checking while processing the SITE EXEC command.

Red Hat alert: remote root exploit (SITE EXEC) fixed

  • Mailing list (Posted by dave on Jun 23, 2000 2:29 PM EDT)
  • Story Type: Security; Groups: Red Hat
A security bug in wu-ftpd can permit remote users, even without an account, to gain root access. The new version closes the hole.

Debian alert: New Debian wu-ftpd packages released

  • Mailing list (Posted by dave on Jun 22, 2000 11:17 PM EDT)
  • Story Type: Security; Groups: Debian
The version of wu-ftpd distributed in Debian GNU/Linux 2.1 (a.k.a. slink), as well as in the frozen (potato) and unstable (woody) distributions, is vulnerable to a remote root compromise. The default configuration in all current Debian packages prevents the currently available exploits in the case of anonymous access, although local users could still possibly compromise the server.

« Previous ( 1 ... 7462 7463 7464 7465 7466 7467 ... 7468 ) Next »