Showing all newswire headlines
View by date, instead?« Previous ( 1 ... 7427 7428 7429 7430 7431 7432 7433 7434 7435 7436 7437 ... 7438 ) Next »
Debian alert: New version of cupsys released
Mandrake has recently released a security advisory against CUPS
raising two issues:
Debian alert: New Debian cron packages released
The version of Vixie Cron shipped with Debian GNU/Linux 2.2 is vulnerable to
a local attack, discovered by Michal Zalewski. Several problems, including
insecure permissions on temporary files and race conditions in their
deletion, allowed attacks from a denial of service (preventing the editing
of crontabs) to an escalation of priviledge (when another user edited their
crontab).
Debian alert: New version of openssh released
The adv.fwd security advisory from OpenBSD reported a problem
with openssh that Jacob Langseth <jwl@pobox.com> found: when
the connection is established the remote ssh server can force
the ssh client to enable agent and X11 forwarding.
Red Hat alert: Updated modutils fixing local root security bug available
A local root exploit in modutils has been fixed.
2000-11-17: New packages available for Red Hat Linux 6.2 to
fix an error in the previous packages.
Red Hat alert: New Netscape packages available
New Netscape packages are available that fix a buffer overflow
in parsing HTML.
It is recommended that all Netscape users update to the fixed
packages.
SuSE alert: tcpdump
tcpdump is a widespread network/packet analysis tool, also known as a packet sniffer, used in unix/unix-like environment. Several overflowable buffers have been found in SuSE's version of tcpdump that could allow a remote attacker to crash the local tcpdump process. Since tcpdump may be used in combination with intrusion detection systems, a crashed tcpdump process may disable the network monitoring system as a whole. The FreeBSD team who found these vulnerabilities also reported that tcpdump's portion of code that can decode AFS ACL (AFS=Andrew File System, a network filesystem, ACL=Access Control List) packets is vulnerable to a (remotely exploitable) buffer overrun attack that could allow a remote attacker to execute arbitrary commands as root since the tcpdump program usually requires root privileges to gain access to the raw network socket. The versions of tcpdump as shipped with SuSE distributions do not contain the AFS packet decoding capability and are therefore not vulnerable to this second form of attack.
Red Hat alert: Updated modutils fixing local root security bug available
A local root exploit in modutils has been fixed.
SuSE alert: bind8
BIND, the Berkeley Internet Name Daemon, versions before 8.2.2p7, has been found vulnerable to two denial of service attacks: named may crash after a compressed zone transfer request (ZXFR) and if an SRV record (defined in RFC2782) is sent to the server. Administrators testing the ZXFR bug should be aware that it can take several seconds after the triggering the bug until the nameserver daemon crashes. SuSE versions 6.0 through 6.4 are affected by these two problems. The bind8 package in SuSE-7.0 is not affected because a different version of bind8 (8.2.3) was used in this distribution. By the release time of the SuSE-7.0 distribution our engineers have determined that the problems we had with stalling zone transfers under some obscure conditions were not present with the 8.2.3 release of the package.
SuSE alert: SuSE: miscellaneous
This notice addresses the latest security advisories from various Linux vendors as well as private contributors on public security forums. The issues have been collected to keep the noise on the public security forums at a reduced level.
SuSE alert: modules
The modules package is responsible for on-demand loading of kernel modules/drivers. The /sbin/modprobe command, when executed as a new task by the kernel-internal function request_module(), runs with the priviledges of the init process, usually root. Newer versions of the modprobe program contain a bug which allows local users to gain root priviledges. modprobe expands given arguments via /bin/echo and can easily be tricked into executing commands. In order for this bug to be exploitable, a setuid root program must be installed that can trigger the loading of modules (such as ping6).
Debian alert: New version of Debian bind packages released
The version of BIND shipped with Debian GNU/Linux 2.2 is vulnerable to
a remote denial of service attack, which can cause the nameserver to crash
after accessing an uninitialized pointer. This problem is fixed in the current
maintenance release of BIND, 8.2.2P7, and in the Debian package version
8.2.2p7-1 for both stable and unstable releases.
Red Hat alert: Updated bind packages fixing DoS attack available
A remote DoS (denial of service) attack is possible with bind versions
prior to 8.
Debian alert: New version of tcsh released
Proton reported on bugtraq that tcsh did not handle in-here documents
correctly. The version of tcsh that is distributed with Debian GNU/Linux
2.2r0 also suffered from this problem.
Debian alert: New version of gnupg installed
The version of gnupg that was distributed in Debian GNU/Linux 2.2 had
a logic error in the code that checks for valid signatures which could
cause false positive results: Jim Small discovered that if the input
contained multiple signed sections the exit-code gnupg returned was
only valid for the last section, so improperly signed other sections
were not noticed.
Red Hat alert: Updated pine and imap packages are available for Red Hat Linux 5.2, 6.x and 7
Updated pine and imap packages are available for Red Hat Linux 5.2, 6.x and
7.
Red Hat alert: Updated usermode packages available
Updated usermode packages are now available for Red Hat Linux 6.x and 7.
Red Hat alert: Updated gnorpm packages are available for Red Hat Linux 6.1, 6.2, and 7.0
(This is a re-release of the previous errata caused by a missing patch).
A locally-exploitable security hole was found where a normal user could
trick root running GnoRPM into writing to arbitrary files due to a bug in
the gnorpm tmp file handling.
Red Hat alert: Setuid bits are removed on dump to prevent exploit
The Red Hat 7.0 dump is being released for Red Hat 6.x and Red Hat 5.x
in order to remove root setuid bits to prevent a known dump
exploit (#20111).
The new dump packages also include a fix for a buffer overflow (#9899)
Red Hat alert: Updated nss_ldap packages are now available.
Updated nss_ldap packages are now available for Red Hat Linux 6.1, 6.2, and
7.
Red Hat alert: Updated Secure Web Server packages now available
Updated Secure Web Server packages are now available for users of Secure
Web Server 3.
« Previous ( 1 ... 7427 7428 7429 7430 7431 7432 7433 7434 7435 7436 7437 ... 7438 ) Next »