vis Red Hat Security Advisory 2020-1792-01 By packetstormsecurity.com Published On :: Tue, 28 Apr 2020 20:19:57 GMT Red Hat Security Advisory 2020-1792-01 - The curl packages provide the libcurl library and the curl utility for downloading files from servers using various protocols, including HTTP, FTP, and LDAP. Issues addressed include buffer overflow and double free vulnerabilities. Full Article
vis Red Hat Security Advisory 2020-1725-01 By packetstormsecurity.com Published On :: Tue, 28 Apr 2020 20:32:02 GMT Red Hat Security Advisory 2020-1725-01 - The haproxy packages provide a reliable, high-performance network load balancer for TCP and HTTP-based applications. Issues addressed include a HTTP request smuggling vulnerability. Full Article
vis Red Hat Security Advisory 2020-1576-01 By packetstormsecurity.com Published On :: Tue, 28 Apr 2020 20:36:23 GMT Red Hat Security Advisory 2020-1576-01 - memcached is a high-performance, distributed memory object caching system, generic in nature, but intended for use in speeding up dynamic web applications by alleviating database load. Issues addressed include a denial of service vulnerability. Full Article
vis Red Hat Security Advisory 2020-1624-01 By packetstormsecurity.com Published On :: Tue, 28 Apr 2020 20:37:45 GMT Red Hat Security Advisory 2020-1624-01 - PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. Issues addressed include buffer overflow, information leakage, integer overflow, and out of bounds read vulnerabilities. Full Article
vis Red Hat Security Advisory 2020-1962-01 By packetstormsecurity.com Published On :: Wed, 29 Apr 2020 15:59:54 GMT Red Hat Security Advisory 2020-1962-01 - Twisted is an event-based framework for internet applications. Twisted Web is a complete web server, aimed at hosting web applications using Twisted and Python, but fully able to serve static pages too. Issues addressed include an HTTP request smuggling vulnerability. Full Article
vis Red Hat Security Advisory 2020-1963-01 By packetstormsecurity.com Published On :: Wed, 29 Apr 2020 16:04:53 GMT Red Hat Security Advisory 2020-1963-01 - Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks. Issues addressed include HTTP response splitting and buffer under-read vulnerabilities. Full Article
vis Red Hat Security Advisory 2020-1970-01 By packetstormsecurity.com Published On :: Wed, 29 Apr 2020 17:22:44 GMT Red Hat Security Advisory 2020-1970-01 - Chromium is an open-source web browser, powered by WebKit. This update upgrades Chromium to version 81.0.4044.122. Issues addressed include out of bounds read and use-after-free vulnerabilities. Full Article
vis Red Hat Security Advisory 2020-1981-01 By packetstormsecurity.com Published On :: Thu, 30 Apr 2020 14:47:45 GMT Red Hat Security Advisory 2020-1981-01 - Chromium is an open-source web browser, powered by WebKit. This update upgrades Chromium to version 81.0.4044.129. Issues addressed include a use-after-free vulnerability. Full Article
vis Red Hat Security Advisory 2020-1936-01 By packetstormsecurity.com Published On :: Mon, 04 May 2020 17:06:58 GMT Red Hat Security Advisory 2020-1936-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. Issues addressed include HTTP request smuggling and out of bounds write vulnerabilities. Full Article
vis Red Hat Security Advisory 2020-2033-01 By packetstormsecurity.com Published On :: Wed, 06 May 2020 14:38:29 GMT Red Hat Security Advisory 2020-2033-01 - Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 68.8.0 ESR. Issues addressed include buffer overflow and use-after-free vulnerabilities. Full Article
vis Red Hat Security Advisory 2020-2032-01 By packetstormsecurity.com Published On :: Wed, 06 May 2020 14:38:46 GMT Red Hat Security Advisory 2020-2032-01 - Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 68.8.0 ESR. Issues addressed include buffer overflow and use-after-free vulnerabilities. Full Article
vis Red Hat Security Advisory 2020-2031-01 By packetstormsecurity.com Published On :: Wed, 06 May 2020 14:40:14 GMT Red Hat Security Advisory 2020-2031-01 - Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 68.8.0 ESR. Issues addressed include buffer overflow and use-after-free vulnerabilities. Full Article
vis Red Hat Security Advisory 2020-2037-01 By packetstormsecurity.com Published On :: Wed, 06 May 2020 14:42:31 GMT Red Hat Security Advisory 2020-2037-01 - Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 68.8.0 ESR. Issues addressed include buffer overflow and use-after-free vulnerabilities. Full Article
vis Red Hat Security Advisory 2020-2036-01 By packetstormsecurity.com Published On :: Wed, 06 May 2020 14:45:03 GMT Red Hat Security Advisory 2020-2036-01 - Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 68.8.0 ESR. Issues addressed include buffer overflow and use-after-free vulnerabilities. Full Article
vis Red Hat Security Advisory 2020-2039-01 By packetstormsecurity.com Published On :: Wed, 06 May 2020 14:48:42 GMT Red Hat Security Advisory 2020-2039-01 - Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects. Issues addressed include buffer overflow and code execution vulnerabilities. Full Article
vis Red Hat Security Advisory 2020-2038-01 By packetstormsecurity.com Published On :: Wed, 06 May 2020 14:51:01 GMT Red Hat Security Advisory 2020-2038-01 - Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects. Issues addressed include buffer overflow and code execution vulnerabilities. Full Article
vis Red Hat Security Advisory 2020-2041-01 By packetstormsecurity.com Published On :: Wed, 06 May 2020 14:51:23 GMT Red Hat Security Advisory 2020-2041-01 - Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects. Issues addressed include buffer overflow and code execution vulnerabilities. Full Article
vis Red Hat Security Advisory 2020-2040-01 By packetstormsecurity.com Published On :: Wed, 06 May 2020 14:54:10 GMT Red Hat Security Advisory 2020-2040-01 - Squid is a high-performance proxy caching server for web clients, supporting FTP, Gopher, and HTTP data objects. Issues addressed include buffer overflow and code execution vulnerabilities. Full Article
vis Red Hat Security Advisory 2020-0431-01 By packetstormsecurity.com Published On :: Wed, 05 Feb 2020 18:50:02 GMT Red Hat Security Advisory 2020-0431-01 - KornShell is a Unix shell developed by AT&T Bell Laboratories, which is backward-compatible with the Bourne shell and includes many features of the C shell. The most recent version is KSH-93. KornShell complies with the POSIX.2 standard. A code injection vulnerability has been addressed. Full Article
vis Red Hat Security Advisory 2020-0515-01 By packetstormsecurity.com Published On :: Mon, 17 Feb 2020 17:26:14 GMT Red Hat Security Advisory 2020-0515-01 - KornShell is a Unix shell developed by AT&T Bell Laboratories, which is backward-compatible with the Bourne shell and includes many features of the C shell. The most recent version is KSH-93. KornShell complies with the POSIX.2 standard. A code injection vulnerability has been addressed. Full Article
vis Red Hat Security Advisory 2020-0559-01 By packetstormsecurity.com Published On :: Thu, 20 Feb 2020 21:13:20 GMT Red Hat Security Advisory 2020-0559-01 - KornShell is a Unix shell developed by AT&T Bell Laboratories, which is backward-compatible with the Bourne shell and includes many features of the C shell. The most recent version is KSH-93. KornShell complies with the POSIX.2 standard. A code injection vulnerability was addressed. Full Article
vis Red Hat Security Advisory 2020-0568-01 By packetstormsecurity.com Published On :: Tue, 25 Feb 2020 15:06:40 GMT Red Hat Security Advisory 2020-0568-01 - KornShell is a Unix shell developed by AT&T Bell Laboratories, which is backward-compatible with the Bourne shell and includes many features of the C shell. The most recent version is KSH-93. KornShell complies with the POSIX.2 standard. A code injection vulnerability was addressed. Full Article
vis Red Hat Security Advisory 2020-0853-01 By packetstormsecurity.com Published On :: Wed, 18 Mar 2020 15:00:12 GMT Red Hat Security Advisory 2020-0853-01 - The zsh shell is a command interpreter usable as an interactive login shell and as a shell script command processor. Zsh resembles the ksh shell, but includes many enhancements. Zsh supports command-line editing, built-in spelling correction, programmable command completion, shell functions, a history mechanism, and more. An issue with insecure dropping of privileges when unsetting PRIVILEGED option was addressed. Full Article
vis Red Hat Security Advisory 2020-0892-01 By packetstormsecurity.com Published On :: Wed, 18 Mar 2020 15:21:53 GMT Red Hat Security Advisory 2020-0892-01 - The zsh shell is a command interpreter usable as an interactive login shell and as a shell script command processor. Zsh resembles the ksh shell, but includes many enhancements. Zsh supports command-line editing, built-in spelling correction, programmable command completion, shell functions, a history mechanism, and more. An issue with insecure dropping of privileges when unsetting PRIVILEGED option was addressed. Full Article
vis Red Hat Security Advisory 2020-0903-01 By packetstormsecurity.com Published On :: Thu, 19 Mar 2020 15:22:41 GMT Red Hat Security Advisory 2020-0903-01 - The zsh shell is a command interpreter usable as an interactive login shell and as a shell script command processor. Zsh resembles the ksh shell, but includes many enhancements. Zsh supports command-line editing, built-in spelling correction, programmable command completion, shell functions, a history mechanism, and more. An issue with insecure dropping of privileges when unsetting PRIVILEGED option was addressed. Full Article
vis Red Hat Security Advisory 2020-0978-01 By packetstormsecurity.com Published On :: Thu, 26 Mar 2020 14:48:50 GMT Red Hat Security Advisory 2020-0978-01 - The zsh shell is a command interpreter usable as an interactive login shell and as a shell script command processor. Zsh resembles the ksh shell, but includes many enhancements. Zsh supports command-line editing, built-in spelling correction, programmable command completion, shell functions, a history mechanism, and more. An issue with insecure dropping of privileges when unsetting PRIVILEGED option was addressed. Full Article
vis Gentoo Linux Security Advisory 202003-57 By packetstormsecurity.com Published On :: Fri, 27 Mar 2020 13:06:15 GMT Gentoo Linux Security Advisory 202003-57 - Multiple vulnerabilities have been found in PHP, the worst of which could result in the execution of arbitrary shell commands. Versions less than 7.4.4 are affected. Full Article
vis Red Hat Security Advisory 2020-1113-01 By packetstormsecurity.com Published On :: Wed, 01 Apr 2020 15:16:42 GMT Red Hat Security Advisory 2020-1113-01 - The bash packages provide Bash, which is the default shell for Red Hat Enterprise Linux. Full Article
vis Red Hat Security Advisory 2020-1332-01 By packetstormsecurity.com Published On :: Mon, 06 Apr 2020 19:18:02 GMT Red Hat Security Advisory 2020-1332-01 - KornShell is a Unix shell developed by AT+T Bell Laboratories, which is backward-compatible with the Bourne shell and includes many features of the C shell. The most recent version is KSH-93. KornShell complies with the POSIX.2 standard. A code injection vulnerability has been addressed. Full Article
vis Red Hat Security Advisory 2020-1333-01 By packetstormsecurity.com Published On :: Mon, 06 Apr 2020 19:18:52 GMT Red Hat Security Advisory 2020-1333-01 - KornShell is a Unix shell developed by AT+T Bell Laboratories, which is backward-compatible with the Bourne shell and includes many features of the C shell. The most recent version is KSH-93. KornShell complies with the POSIX.2 standard. A code injection vulnerability has been addressed. Full Article
vis Red Hat Security Advisory 2020-1933-01 By packetstormsecurity.com Published On :: Wed, 29 Apr 2020 15:44:21 GMT Red Hat Security Advisory 2020-1933-01 - The targetcli package contains an administration shell for configuring Internet Small Computer System Interface, Fibre Channel over Ethernet, and other SCSI targets, using the Target Core Mod/Linux-IO kernel target subsystem. FCoE users also need to install and use the fcoe-utils package. A command execution vulnerability was addressed. Full Article
vis Debian Security Advisory 4507-1 By packetstormsecurity.com Published On :: Mon, 26 Aug 2019 15:54:12 GMT Debian Linux Security Advisory 4507-1 - Several vulnerabilities were discovered in Squid, a fully featured web proxy cache. The flaws in the HTTP Digest Authentication processing, the HTTP Basic Authentication processing and in the cachemgr.cgi allowed remote attackers to perform denial of service and cross-site scripting attacks, and potentially the execution of arbitrary code. Full Article
vis Mandriva Linux Security Advisory 2015-208 By packetstormsecurity.com Published On :: Mon, 27 Apr 2015 16:20:27 GMT Mandriva Linux Security Advisory 2015-208 - An issue has been identified in Mandriva Business Server 2's setup package where the /etc/shadow and /etc/gshadow files containing password hashes were created with incorrect permissions, making them world-readable. This update fixes this issue by enforcing that those files are owned by the root user and shadow group, and are only readable by those two entities. Note that this issue only affected new Mandriva Business Server 2 installations. Systems that were updated from previous Mandriva versions were not affected. This update was already issued as MDVSA-2015:184, but the latter was withdrawn as it generated.rpmnew files for critical configuration files, and rpmdrake might propose the user to use those basically empty files, thus leading to loss of passwords or partition table. This new update ensures that such.rpmnew files are not kept after the update. Full Article
vis Mandriva Linux Security Advisory 2015-209 By packetstormsecurity.com Published On :: Mon, 27 Apr 2015 16:21:20 GMT Mandriva Linux Security Advisory 2015-209 - Update PHP packages address buffer over-read and overflow vulnerabilities. PHP has been updated to version 5.5.24, which fixes these issues and other bugs. Additionally the timezonedb packages has been upgraded to the latest version and the PECL packages which requires so has been rebuilt for php-5.5.24. Full Article
vis Mandriva Linux Security Advisory 2015-210 By packetstormsecurity.com Published On :: Mon, 27 Apr 2015 16:22:27 GMT Mandriva Linux Security Advisory 2015-210 - A denial of service flaw was found in the way QEMU handled malformed Physical Region Descriptor Table data sent to the host's IDE and/or AHCI controller emulation. A privileged guest user could use this flaw to crash the system. It was found that the QEMU's websocket frame decoder processed incoming frames without limiting resources used to process the header and the payload. An attacker able to access a guest's VNC console could use this flaw to trigger a denial of service on the host by exhausting all available memory and CPU. Full Article
vis Mandriva Linux Security Advisory 2015-211 By packetstormsecurity.com Published On :: Mon, 27 Apr 2015 16:23:02 GMT Mandriva Linux Security Advisory 2015-211 - glusterfs was vulnerable to a fragment header infinite loop denial of service attack. Also, the glusterfsd SysV init script was failing to properly start the service. This was fixed by replacing it with systemd unit files for the service that work properly. Full Article
vis Mandriva Linux Security Advisory 2015-212 By packetstormsecurity.com Published On :: Tue, 28 Apr 2015 00:55:24 GMT Mandriva Linux Security Advisory 2015-212 - An off-by-one flaw, leading to a buffer overflow, was found in the font parsing code in the 2D component in OpenJDK. A specially crafted font file could possibly cause the Java Virtual Machine to execute arbitrary code, allowing an untrusted Java application or applet to bypass Java sandbox restrictions. A flaw was found in the way the Hotspot component in OpenJDK handled phantom references. An untrusted Java application or applet could use this flaw to corrupt the Java Virtual Machine memory and, possibly, execute arbitrary code, bypassing Java sandbox restrictions. A flaw was found in the way the JSSE component in OpenJDK parsed X.509 certificate options. A specially crafted certificate could cause JSSE to raise an exception, possibly causing an application using JSSE to exit unexpectedly. A flaw was discovered in the Beans component in OpenJDK. An untrusted Java application or applet could use this flaw to bypass certain Java sandbox restrictions. A directory traversal flaw was found in the way the jar tool extracted JAR archive files. A specially crafted JAR archive could cause jar to overwrite arbitrary files writable by the user running jar when the archive was extracted. It was found that the RSA implementation in the JCE component in OpenJDK did not follow recommended practices for implementing RSA signatures. Full Article
vis Mandriva Linux Security Advisory 2015-213 By packetstormsecurity.com Published On :: Wed, 29 Apr 2015 18:22:00 GMT Mandriva Linux Security Advisory 2015-213 - lftp incorrectly validates wildcard SSL certificates containing literal IP addresses, so under certain conditions, it would allow and use a wildcard match specified in the CN field, allowing a malicious server to participate in a MITM attack or just fool users into believing that it is a legitimate site. lftp was affected by this issue as it uses code from cURL for checking SSL certificates. The curl package was fixed in MDVSA-2015:098. Full Article
vis Mandriva Linux Security Advisory 2015-214 By packetstormsecurity.com Published On :: Wed, 29 Apr 2015 18:23:00 GMT Mandriva Linux Security Advisory 2015-214 - The libksba package has been updated to version 1.3.3, which fixes an integer overflow in the DN decoder and a couple of other minor bugs. Full Article
vis Mandriva Linux Security Advisory 2015-215 By packetstormsecurity.com Published On :: Wed, 29 Apr 2015 18:25:00 GMT Mandriva Linux Security Advisory 2015-215 - The t1utils package has been updated to version 1.39, which fixes a buffer overrun, infinite loop, and stack overflow in t1disasm. Full Article
vis Mandriva Linux Security Advisory 2015-216 By packetstormsecurity.com Published On :: Wed, 29 Apr 2015 18:28:00 GMT Mandriva Linux Security Advisory 2015-216 - Lack of filtering in the title parameter of links to rrdPlugin allowed cross-site-scripting attacks against users of the web interface. Full Article
vis Mandriva Linux Security Advisory 2015-217 By packetstormsecurity.com Published On :: Thu, 30 Apr 2015 15:46:33 GMT Mandriva Linux Security Advisory 2015-217 - SQLite before 3.8.9 does not properly implement the dequoting of collation-sequence names, which allows context-dependent attackers to cause a denial of service (uninitialized memory access and application crash) or possibly have unspecified other impact via a crafted COLLATE clause, as demonstrated by COLLATE at the end of a SELECT statement. The sqlite3VdbeExec function in vdbe.c in SQLite before 3.8.9 does not properly implement comparison operators, which allows context-dependent attackers to cause a denial of service (invalid free operation) or possibly have unspecified other impact via a crafted CHECK clause, as demonstrated by CHECK in a CREATE TABLE statement. The sqlite3VXPrintf function in printf.c in SQLite before 3.8.9 does not properly handle precision and width values during floating-point conversions, which allows context-dependent attackers to cause a denial of service or possibly have unspecified other impact via large integers in a crafted printf function call in a SELECT statement. The updated packages provides a solution for these security issues. Full Article
vis Mandriva Linux Security Advisory 2015-218 By packetstormsecurity.com Published On :: Thu, 30 Apr 2015 15:46:57 GMT Mandriva Linux Security Advisory 2015-218 - Multiple vulnerabilities have been found and corrected in glibc. It was discovered that, under certain circumstances, glibc's getaddrinfo() function would send DNS queries to random file descriptors. An attacker could potentially use this flaw to send DNS queries to unintended recipients, resulting in information disclosure or data loss due to the application encountering corrupted data. Various other issues were also addressed. The updated packages provides a solution for these security issues. Full Article
vis Mandriva Linux Security Advisory 2015-220 By packetstormsecurity.com Published On :: Mon, 04 May 2015 17:18:17 GMT Mandriva Linux Security Advisory 2015-220 - NTLM-authenticated connections could be wrongly reused for requests without any credentials set, leading to HTTP requests being sent over the connection authenticated as a different user. When doing HTTP requests using the Negotiate authentication method along with NTLM, the connection used would not be marked as authenticated, making it possible to reuse it and send requests for one user over the connection authenticated as a different user. Full Article
vis Mandriva Linux Security Advisory 2015-219 By packetstormsecurity.com Published On :: Mon, 04 May 2015 17:18:27 GMT Mandriva Linux Security Advisory 2015-219 - NTLM-authenticated connections could be wrongly reused for requests without any credentials set, leading to HTTP requests being sent over the connection authenticated as a different user. When parsing HTTP cookies, if the parsed cookie's path element consists of a single double-quote, libcurl would try to write to an invalid heap memory address. This could allow remote attackers to cause a denial of service. When doing HTTP requests using the Negotiate authentication method along with NTLM, the connection used would not be marked as authenticated, making it possible to reuse it and send requests for one user over the connection authenticated as a different user. Full Article
vis Mandriva Linux Security Advisory 2015-221 By packetstormsecurity.com Published On :: Mon, 04 May 2015 17:19:13 GMT Mandriva Linux Security Advisory 2015-221 - Multiple vulnerabilities have been found and corrected in clamav. The updated packages provides a solution for these security issues. Full Article
vis Mandriva Linux Security Advisory 2015-222 By packetstormsecurity.com Published On :: Mon, 04 May 2015 17:20:08 GMT Mandriva Linux Security Advisory 2015-222 - Emanuele Rocca discovered that ppp was subject to a buffer overflow when communicating with a RADIUS server. This would allow unauthenticated users to cause a denial-of-service by crashing the daemon. Full Article
vis Mandriva Linux Security Advisory 2015-224 By packetstormsecurity.com Published On :: Mon, 04 May 2015 21:15:52 GMT Mandriva Linux Security Advisory 2015-224 - Ruby OpenSSL hostname matching implementation violates RFC 6125. The ruby packages for MBS2 has been updated to version 2.0.0-p645, which fixes this issue. Full Article
vis Mandriva Linux Security Advisory 2015-225 By packetstormsecurity.com Published On :: Mon, 04 May 2015 21:16:03 GMT Mandriva Linux Security Advisory 2015-225 - The cherokee_validator_ldap_check function in validator_ldap.c in Cherokee 1.2.103 and earlier, when LDAP is used, does not properly consider unauthenticated-bind semantics, which allows remote attackers to bypass authentication via an empty password. Full Article
vis Mandriva Linux Security Advisory 2015-226 By packetstormsecurity.com Published On :: Mon, 04 May 2015 21:16:14 GMT Mandriva Linux Security Advisory 2015-226 - FCGI does not perform range checks for file descriptors before use of the FD_SET macro. This FD_SET macro could allow for more than 1024 total file descriptors to be monitored in the closing state. This may allow remote attackers to cause a denial of service (stack memory corruption, and infinite loop or daemon crash) by opening many socket connections to the host and crashing the service. Full Article