Showing all newswire headlines
View by date, instead?« Previous ( 1 ... 7440 7441 7442 7443 7444 7445 7446 7447 ... 7448 ) Next »
Red Hat alert: Updated mgetty packages are now available.
The mgetty-sendfax package contains a vulnerability which allows any
user with access to the /var/tmp directory to destroy any file on any
mounted filesystem.
Debian alert: New version of xpdf released
xpdf as distributed in Debian GNU/Linux 2.2 suffered from two problems:
1. creation of temporary files was not done safely which made xpdf
vulnerable to a symlink attack.
2. when handling URLs in documents no checking was done for shell
metacharacters before starting the browser. This makes it possible
to construct a document which cause xpdf to run arbitrary commands
when the user views an URL.
Debian alert: New version of horde and imp released
imp as distributed in Debian GNU/Linux 2.2 suffered from insufficient
checking of user supplied data: the IMP webmail interface did not check
the $from variable which contains the sender address for shell
metacharacters. This could be used to run arbitrary commands on the
server running imp.
Red Hat alert: glibc vulnerabilities in ld.so, locale and gettext
Several bugs were discovered in glibc which could allow local users to
gain root privileges.
SuSE alert: apache
The default package selection in SuSE distributions includes apache. The configuration file that comes with the package contains two security relevant errors:
SuSE alert: screen
screen, a tty multiplexer, is installed suid root by default on SuSE Linux distributions. By supplying a thoughtfully designed string as the visual bell message, local users can obtain root privilege. Exploit information has been published on security forums.
SuSE alert: shlibs (glibc)
The glibc implementations in all SuSE distributions starting with SuSE-6.0 have multiple security problems where at least one of them allows any local user to gain root access to the system.
Slackware alert: glibc 2.1.3 vulnerabilities patched
Three locale-related vulnerabilities with glibc 2.1.3 were recently
reported on BugTraq. These vulnerabilities could allow local users to
gain root access.
Debian alert: glibc update for Debian GNU/Linux 2.1 (update)
Recently two problems have been found in the glibc suite, which could be
used to trick setuid applications to run arbitrary code.
Debian alert: glibc update for Debian GNU/Linux 2.1
Recently two problems have been found in the glibc suite, which could be
used to trick setuid applications to run arbitrary code.
Debian alert: new version of screen released
A format string bug was recently discovered in screen which can be used
to gain elevated privilages if screen is setuid. Debian 2.1 (slink) did
ship screen setuid and the exploit can be used to gain root privilages.
In Debian 2.2 (potato) screen is not setuid, and is not vulnerable to a
root exploit. screen is, however, setgid utmp in Debian 2.2 (potato) and
we recommend upgrading.
Slackware alert: Perl root exploit in Slackware 7.1 & -current
A root exploit was found in the /usr/bin/suidperl5.6.0 program that
shipped with the Slackware 7.1 perl.tgz package.
Debian alert: New version of glibc released
Recently two problems have been found in the glibc suite, which could be
used to trick setuid applications to run arbitrary code.
Debian alert: New version of Netscape Communicator/Navigator released
Existing Netscape Communicator/Navigator packages contain the following
vulnerabilities:
Red Hat alert: glibc vulnerabilities in ld.so, locale and gettext
Several bugs were discovered in glibc which could allow local users to
gain root privileges.
Debian alert: New version of xchat released (update)
The version of X-Chat that was distributed with Debian GNU/Linux 2.2
has a vulnerability in the URL handling code: when a user clicks on
a URL X-Chat will start netscape to view its target. However it
did not check the URL for shell metacharacters, and this could be
abused to trick xchat into executing arbitraty commands.
Debian alert: New version of xchat released
The version of X-Chat that was distributed with Debian GNU/Linux 2.2
has a vulnerability in the URL handling code: when a user clicks on
a URL X-Chat will start netscape to view its target. However it
did not check the URL for shell metacharacters, and this could be
abused to trick xchat into executing arbitraty commands.
Debian alert: New version of ntop released
The updated version of ntop (1.2a7-10) that was released on August 5
was found to still be insecure: it was still exploitable using buffer
overflows. Using this technique it was possible to run arbitrary code
as the user who ran ntop in web mode.
Red Hat alert: Updated usermode packages.
Updated usermode packages are now available for Red Hat Linux 6.0, 6.1, and
6.
SuSE alert: Netscape
Due to US-American export restrictions for cryptographical software,
we are unable to provide update packages on our US ftp server http://ftp.suse.com. Instead, the packages can be found on http://ftp.suse.de. For
The legal issues have been resolved: Here are the links to download the SuSE Netscape update packages from our US-American ftp server:
The legal issues have been resolved: Here are the links to download the SuSE Netscape update packages from our US-American ftp server:
« Previous ( 1 ... 7440 7441 7442 7443 7444 7445 7446 7447 ... 7448 ) Next »