Linux Advisory Watch
Distribution: Conectiva
* Conectiva: mplayer vulnerabilities fix
iDEFENSE[2] found a buffer overflow vulnerability[3] due to an error
in dynamically allocating memory and further investigation by mplayer
team found more vulnerabilities. This announcement fixes these
vulnerabilities.
http://www.linuxsecurity.com/content/view/117769
* Conectiva: Samba vulnerabilities fix
Remote exploitation of an integer overflow vulnerability[2] in the
smbd daemon could allow an attacker to cause controllable heap
corruption, leading to execution of arbitrary commands with root
privileges.
http://www.linuxsecurity.com/content/view/117793
* Conectiva: wxgtk2 library vulnerabilities fix
Several vulnerabilities were found in libtiff, which may also be in
wxGTK library, since it has a private copy of libtiff's source.
http://www.linuxsecurity.com/content/view/117794
Distribution: Debian
* Debian: CUPS arbitrary code execution fix
An iDEFENSE security researcher discovered a buffer overflow in xpdf,
the Portable Document Format (PDF) suite. Similar code is present in
the PDF processing part of CUPS. A maliciously crafted PDF file
could exploit this problem, leading to the execution of arbitrary
code.
http://www.linuxsecurity.com/content/view/117725
* Debian: htmlheadline insecure temporary files fix
Javier Fern=C3=A1ndez-Sanguino Pe=C3=B1a has discovered multiple insecure uses
of temporary files that could lead to overwriting arbitrary files via
a symlink attack.
http://www.linuxsecurity.com/content/view/117726
* Debian: nasm arbitrary code execution fix
Jonathan Rockway discovered a buffer overflow in nasm, the
general-purpose x86 assembler, which could lead to the execution of
arbitrary code when compiling a maliciously crafted assembler source
file.
http://www.linuxsecurity.com/content/view/117756
* Debian: zip arbitrary code execution fix
A buffer overflow has been discovered in zip, the archiver for .zip
files. When doing recursive folder compression the program did not
check the resulting path length, which would lead to memory being
overwritten. A malicious person could convince a user to create an
archive containing a specially crafted path name, which could lead to
the execution of arbitrary code.
http://www.linuxsecurity.com/content/view/117767
* Debian: pcal arbitrary code execution fix
Danny Lungstrom discovered two buffer overflows in pcal, a program to
generate Postscript calendars, that could lead to the execution of
arbitrary code when compiling a calendar.
http://www.linuxsecurity.com/content/view/117770
* Debian: tiff denial of service fix
Dmitry V. Levin discovered a buffer overflow in libtiff, the Tag
Image File Format library for processing TIFF graphics files. Upon
reading a TIFF file it is possible to crash the application, and
maybe also to execute arbitrary code.
http://www.linuxsecurity.com/content/view/117780
* Debian: namazu2 cross-site scripting vulnerability fix
A cross-site scripting vulnerability has been discovered in namazu2,
a full text search engine. An attacker could prepare specially
crafted input that would not be sanitised by namazu2 and hence
displayed verbatim for the victim.
http://www.linuxsecurity.com/content/view/117790
* Debian: imlib2 arbitrary code execution fix
Pavel Kankovsky discovered that several overflows found in the libXpm
library were also present in imlib and imlib2, imaging libraries for
X11. An attacker could create a carefully crafted image file in such
a way that it could cause an application linked with imlib or imlib2
to execute arbitrary code when the file was opened by a victim.
http://www.linuxsecurity.com/content/view/117791
Distribution: Fedora
* Fedora: selinux-policy-targeted-1.17.30-2.62 update
Fix for postgres startup scripts.
http://www.linuxsecurity.com/content/view/117729
* Fedora: tetex-2.0.2-14FC2.1 update
The updated tetex package fixes a buffer overflow which allows
attackers to cause the internal xpdf library used by applications in
tetex to crash, and possibly to execute arbitrary code. The Common
Vulnerabilities and Exposures projects (cve.mitre.org) has assigned
the name CAN-2004-1125 to this issue.
http://www.linuxsecurity.com/content/view/117742
* Fedora: tetex-2.0.2-21.2 update
The updated tetex package fixes a buffer overflow which allows
attackers to cause the internal xpdf library used by applications in
tetex to crash, and possibly to execute arbitrary code. The Common
Vulnerabilities and Exposures projects (cve.mitre.org) has assigned
the name CAN-2004-1125 to this issue.
http://www.linuxsecurity.com/content/view/117743
* Fedora: pcmcia-cs-3.2.7-2.1 update
This update fixes bug #135508, silencing a warning message on cardmgr
startup.
http://www.linuxsecurity.com/content/view/117750
* Fedora: pcmcia-cs-3.2.7-1.8.2.2 update
This update fixes bug #135508, silencing a warning message on cardmgr
startup.
http://www.linuxsecurity.com/content/view/117751
* Fedora: kernel-2.6.9-1.11_FC2 update
A large change over previous kernels has been made. The 4G:4G memory
split patch has been dropped, and Fedora kernels now revert back to
the upstream 3G:1G kernel/userspace split.
http://www.linuxsecurity.com/content/view/117752
* Fedora: kernel-2.6.9-1.724_FC3 update
A large change over previous kernels has been made. The 4G:4G memory
split patch has been dropped, and Fedora kernels now revert back to
the upstream 3G:1G kernel/userspace split.
http://www.linuxsecurity.com/content/view/117753
* Fedora: mysql-3.23.58-14 update
work around SELinux restriction that breaks mysql_install_db (bug
#141062). Add a restorecon to keep the mysql.log file in the right
context (bz#143887). Fix init script to not need a valid username for
startup check (bz#142328). Don't assume /etc/my.cnf will specify
pid-file (bz#143724)
http://www.linuxsecurity.com/content/view/117777
* Fedora: man-pages-ja-20041215-1.FC3.0 update
prefer GNU fileutils's chown(1) rather than gnumaniak's. (#142077)
http://www.linuxsecurity.com/content/view/117783
* Fedora: ruby-1.8.2-1.FC3.0 update
New upstream release.
http://www.linuxsecurity.com/content/view/117784
* Fedora: man-pages-ja-20041215-1.FC2.0 update
Fixed wrong filename for in.rlogind.8 man pages. prefer GNU
fileutils's chown(1) rather than gnumaniak's.
http://www.linuxsecurity.com/content/view/117785
* Fedora: tetex-2.0.2-14FC2.1 update
The updated tetex package fixes a buffer overflow which allows
attackers to cause the internal xpdf library used by applications in
tetex to crash, and possibly to execute arbitrary code. The Common
Vulnerabilities and Exposures projects (cve.mitre.org) has assigned
the name CAN-2004-1125 to this issue.
http://www.linuxsecurity.com/content/view/117786
* Fedora: tetex-2.0.2-21.2 update
The updated tetex package fixes a buffer overflow which allows
attackers to cause the internal xpdf library used by applications in
tetex to crash, and possibly to execute arbitrary code. The Common
Vulnerabilities and Exposures projects (cve.mitre.org) has assigned
the name CAN-2004-1125 to this issue.
http://www.linuxsecurity.com/content/view/117787
* Fedora: gpdf-2.8.0-8.2 update
Applied patch to fix CAN-2004-1125 (bug #144210)
http://www.linuxsecurity.com/content/view/117788
* Fedora: gpdf-2.8.0-4.2.fc2 update
Applied patch to fix CAN-2004-1125 (bug #144210)
http://www.linuxsecurity.com/content/view/117789
* Fedora: hotplug-2004_04_01-8.1 update
This adds a fix to properly set the path for devices on USB removal.
http://www.linuxsecurity.com/content/view/117792
Distribution: Gentoo
* Gentoo: LinPopUp Buffer overflow in message reply
LinPopUp contains a buffer overflow potentially allowing execution of
arbitrary code.
http://www.linuxsecurity.com/content/view/117760
* Gentoo: a2ps Insecure temporary files handling
The fixps and psmandup scripts in the a2ps package are vulnerable to
symlink attacks, potentially allowing a local user to overwrite
arbitrary files.
http://www.linuxsecurity.com/content/view/117761
* Gentoo: Mozilla, Firefox, Thunderbird Various vulnerabilities
Various vulnerabilities were found and fixed in Mozilla-based
products, ranging from a potential buffer overflow and temporary
files disclosure to anti-spoofing issues.
http://www.linuxsecurity.com/content/view/117768
* Gentoo: shoutcast Remote code execution
Shoutcast Server contains a possible buffer overflow that could lead
to the execution of arbitrary code.
http://www.linuxsecurity.com/content/view/117771
* Gentoo: mit-kbr5 Heap overflow in libkadm5srv
The MIT Kerberos 5 administration library (libkadm5srv) contains a
heap overflow that could lead to execution of arbitrary code.
http://www.linuxsecurity.com/content/view/117778
* Gentoo: tiff New overflows in image decoding
An integer overflow has been found in the TIFF library image decoding
routines and the tiffdump utility, potentially allowing arbitrary
code execution.
http://www.linuxsecurity.com/content/view/117779
* Gentoo: xine-lib Multiple overflows
xine-lib contains multiple overflows potentially allowing execution
of arbitrary code.
http://www.linuxsecurity.com/content/view/117781
* Gentoo: phpGroupWare Various vulnerabilities
Multiple vulnerabilities have been discovered in phpGroupWare that
could lead to information disclosure or remote compromise.
http://www.linuxsecurity.com/content/view/117798
* Gentoo: xzgv Multiple overflows
xzgv contains multiple overflows that may lead to the execution of
arbitrary code.
http://www.linuxsecurity.com/content/view/117806
* Gentoo: vilistextum Buffer overflow vulnerability
Vilistextum is vulnerable to a buffer overflow that allows an
attacker to execute arbitrary code through the use of a malicious
webpage.
http://www.linuxsecurity.com/content/view/117807
Distribution: Mandrake
* Mandrake: libtiff multiple vulnerabilities fix
Several vulnerabilities have been discovered in the libtiff package.
http://www.linuxsecurity.com/content/view/117801
* Mandrake: wcGTK2 vulnerabilities fix
Several vulnerabilities have been discovered in the libtiff package;
wxGTK2 uses a libtiff code tree, so it may have the same
vulnerabilities.
http://www.linuxsecurity.com/content/view/117802
* Mandrake: vim modeline vulnerabilities fix
Several "modeline"-related vulnerabilities were discovered in Vim by
Ciaran McCreesh. The updated packages have been patched with Bram
Moolenaar's vim 6.3.045 patch which fixes the reported
vulnerabilities and adds more conservative "modeline" rights.
http://www.linuxsecurity.com/content/view/117803
* Mandrake: nasm buffer overflow vulnerability fix
A buffer overflow in nasm was discovered by Jonathan Rockway. This
vulnerability could lead to the execution of arbitrary code when
compiling a malicious assembler source file.
http://www.linuxsecurity.com/content/view/117804
* Mandrake: libtiff multiple vulnerabilities fix
Several vulnerabilities have been discovered in the libtiff package.
http://www.linuxsecurity.com/content/view/117805
Distribution: Red Hat
* Red Hat: mc security vulnerabilities fix
An updated mc package that resolves several shell escape security
issues is now available.
http://www.linuxsecurity.com/content/view/117772
* Red Hat: fam security issue fix
Updated fam packages that fix an information disclosure bug are now
available.
http://www.linuxsecurity.com/content/view/117773
* Red Hat: VIM security vulnerability fix
Updated vim packages that fix a modeline vulnerability are now
available.
http://www.linuxsecurity.com/content/view/117774
* Red Hat: samba security issue fix
Updated samba packages that fix an integer overflow vulnerability are
now available for Red Hat Enterprise Linux 2.1.
http://www.linuxsecurity.com/content/view/117775