Showing all newswire headlines

View by date, instead?

« Previous ( 1 ... 7399 7400 7401 7402 7403 7404 7405 7406 7407 7408 7409 ... 7438 ) Next »

Red Hat alert: Updated glibc packages fix vulnerabilities in resolver

  • Mailing list (Posted by dave on Jul 24, 2002 2:32 PM EDT)
  • Story Type: Security; Groups: Red Hat
Updated glibc packages are available to fix two vulnerabilities in the resolver functions.

Red Hat alert: Updated mod_ssl packages available

  • Mailing list (Posted by dave on Jul 16, 2002 12:53 PM EDT)
  • Story Type: Security; Groups: Red Hat
Updated mod_ssl packages are now available for Red Hat Linux 7, 7.1, 7.2, and 7.3. These updates incorporate a fix for an incorrect bounds check in versions of mod_ssl up to and including version

SuSE alert: Resolver

  • Mailing list (Posted by dave on Jul 10, 2002 11:18 AM EDT)
  • Story Type: Security; Groups: SUSE
A vulnerability has been discovered in some resolver library functions. The affected code goes back to the resolver library shipped as part of BIND4; code derived from it has been included in later BIND releases as well as the GNU libc.

SuSE alert: squid

  • Mailing list (Posted by dave on Jul 8, 2002 4:16 PM EDT)
  • Story Type: Security; Groups: SUSE
squid is a web proxy cache contained but not installed and activated by default on SuSE products.

Red Hat alert: New Squid packages available

  • Mailing list (Posted by dave on Jul 3, 2002 6:45 PM EDT)
  • Story Type: Security; Groups: Red Hat
New Squid packages are available which fix various security issues.

SuSE alert: openssh

  • Mailing list (Posted by dave on Jul 2, 2002 12:00 PM EDT)
  • Story Type: Security; Groups: SUSE
SuSE Security has issued two warnings and one SuSE Security Announcement on 25th and 26th of June concerning the vulnerabilities found in the openssh package that is contained and installed by default on most SuSE products. For a few days, the nature of the errors were unknown to the public, making it difficult for distributors to provide proper solutions against the problem. Now that details of the errors have been disclosed, we hereby re-release SuSE Security Announcement SuSE-SA:2002:023 (openssh) under a new announcement ID with links to a set of update packages that represent SuSE's permanent fix for the problems found.

Debian alert: buffer overflow / DoS in libapache-mod-ssl

  • Mailing list (Posted by dave on Jul 2, 2002 4:12 AM EDT)
  • Story Type: Security; Groups: Debian
The libapache-mod-ssl package provides SSL capability to the apache webserver. Recently, a problem has been found in the handling of .htaccess files, allowing arbitrary code execution as the web server user (regardless of ExecCGI / suexec settings), DoS attacks (killing off apache children), and allowing someone to take control of apache child processes - all trough specially crafted .htaccess files. More information about this vulnerability can be found at

Red Hat alert: Updated OpenSSH packages fix various security issues

  • Mailing list (Posted by dave on Jun 27, 2002 1:47 PM EDT)
  • Story Type: Security; Groups: Red Hat
Updated openssh packages are now available for Red Hat Linux 7, 7.1, 7.2, and 7.3. These updates fix an input validation error in OpenSSH.

Debian alert: OpenSSH Remote Challenge Vulnerability

  • Mailing list (Posted by dave on Jun 27, 2002 4:50 AM EDT)
  • Story Type: Security; Groups: Debian
This advisory is an update to DSA-134-3: this advisory contains updated information that is relevant to all Debian installations of OpenSSH (the ssh package). DSA-134-4 supersedes previous versions of DSA-134.

Red Hat alert: Updated mailman packages available

  • Mailing list (Posted by dave on Jun 27, 2002 12:30 AM EDT)
  • Story Type: Security; Groups: Red Hat
Updated mailman packages are now available for Red Hat Secure Web Server 3.2 (U.S.). These updates resolve a cross-site scripting vulnerability present in versions of Mailman prior to

Red Hat alert: Updated secureweb packages fix chunked encoding issue

  • Mailing list (Posted by dave on Jun 26, 2002 2:55 PM EDT)
  • Story Type: Security; Groups: Red Hat
The Apache Web server contains a security vulnerability which can be used to launch a denial of service attack, or in some cases, allow remote code execution. Red Hat Secure Web server is based on the Apache Web server and the secureweb package has been updated to fix this denial of service vulnerability.

Slackware alert: New OpenSSH packages available

"While testing for Oracle vulnerabilities, Mark Litchfield discovered a denial of service attack for Apache on Windows. Investigation by the Apache Software Foundation showed that this issue has a wider scope, which on some platforms results in a denial of service vulnerability, while on some other platforms presents a potential a remote exploit vulnerability."

SuSE alert: More information on the OpenSSH vulnerability

  • Mailing list (Posted by dave on Jun 26, 2002 9:57 AM EDT)
  • Story Type: Security; Groups: SUSE
ISS and the OpenSSH team just released advisories concerning the OpenSSH vulnerability.

Debian alert: Unknown OpenSSH remote vulnerability

  • Mailing list (Posted by dave on Jun 25, 2002 7:50 PM EDT)
  • Story Type: Security; Groups: Debian
This advisory is an update to DSA-134-2: the changes mainly deal with packaging issues; if you have already successfully installed an openssh package from a previous DSA-134 advisory you may disregard this message.

SuSE alert: OpenSSH

  • Mailing list (Posted by dave on Jun 25, 2002 8:10 AM EDT)
  • Story Type: Security; Groups: SUSE
There's a new vulnerabilty in the OpenSSH daemon, of which we were notified yesterday.

Debian alert: Unknown OpenSSH remote vulnerability

  • Mailing list (Posted by dave on Jun 25, 2002 4:37 AM EDT)
  • Story Type: Security; Groups: Debian
This advisory is an update to DSA-134-1: some extra information is provided on broken or changed functionality in this new release and packages for Debian GNU/Linux 2.2/potato are now available.

SuSE alert: OpenSSH Vulnerability

  • Mailing list (Posted by dave on Jun 25, 2002 12:39 AM EDT)
  • Story Type: Security; Groups: SUSE
There's a new vulnerabiltiy in the OpenSSH daemon. The OpenSSH/OpenBSD team does not release any details concerning this issue, except:

Mandrake alert: openssh update

Details of an upcoming OpenSSH vulnerability will be published early next week. According to the OpenSSH team, this remote vulnerability cannot be exploited when sshd is running with privilege separation. The priv separation code is significantly improved in version 3.3 of OpenSSH which was released on June 21st. Unfortunately, there are some known problems with this release; compression does not work on all operating systems and the PAM support has not been completed. The OpenSSH team encourages everyone to upgrade to version 3.3 immediately and enable privilege separation.

Debian alert: OpenSSH remote vulnerability

  • Mailing list (Posted by dave on Jun 24, 2002 1:56 PM EDT)
  • Story Type: Security; Groups: Debian
Theo de Raadt announced that the OpenBSD team is working with ISS on a remote exploit for OpenSSH (a free implementation of the Secure SHell protocol). They are refusing to provide any details on the vulnerability but instead are advising everyone to upgrade to the latest release, version 3.3.

Mandrake alert: apache update (revised)

[ Please note that this advisory supersedes the previous MDKSA-2002:039 and MDKSA-2002:039-1 advisories. ] MandrakeSoft is urging all users of Mandrake Linux to update their Apache installations immediately. What was previously thought to have been a DoS-only condition has now been proven to be more than that; exploitable conditions have been discovered on both 32bit and 64bit platforms.

« Previous ( 1 ... 7399 7400 7401 7402 7403 7404 7405 7406 7407 7408 7409 ... 7438 ) Next »