Hiya
An insecure use of a temporary file has been found in Python. This erratum
provides updated Python packages.
[updated Feb 12 2003]
Updated packages for Red Hat Linux 7.3 are available that fix a binary
incompatibility change in the original erratum packages that affected
redhat-config-users, and to add back the missing python-tools package.
http://www.linuxsecurity.com/advisories/redhat_advisory-2849.html
Updated PAM packages are now available for Red Hat Linux 7.1, 7.2, 7.3, and
8.0. These packages correct a bug in pam_xauth's handling of authorization
data for the root user.
http://www.linuxsecurity.com/advisories/redhat_advisory-2850.html
New fileutils packages for Red Hat Linux 6.2, 7.0, 7.1, 7.2 and 7.3 fix a
race condition in recursive remove and move commands.
http://www.linuxsecurity.com/advisories/redhat_advisory-2851.html
Hironori Sakamoto, one of the w3m developers, found two security
vulnerabilities in w3m and associated programs. The w3m browser does
not properly escape HTML tags in frame contents and img alt
attributes. A malicious HTML frame or img alt attribute may deceive a
user to send his local cookies which are used for configuration. The
information is not leaked automatically, though.
For the stable distribution (woody) these problems have been fixed in
version 0.3.p23.3-1.5. Please note that the update also contains an
important patch to make the program work on the powerpc platform again.
The old stable distribution (potato) is not affected by these
problems.
For the unstable distribution (sid) these problems have been fixed in
version 0.3.p24.17-3 and later.
We recommend that you upgrade your w3mmee-ssl packages.
http://www.linuxsecurity.com/advisories/debian_advisory-2852.html
Mozilla is an open-source web browser designed for standards
compliance, performance and portability.
This update addresses several vulnerabilities found after the mozilla
1.0rc2 release, wich was the last version sent as an official
update[1] for Conectiva Linux distributions. A complete list of such
vulnerabilities can be obtained in [2,3], and details about the most
known ones in [5,6,7,8,9].
A remote attacker could exploit these vulnerabilities by creating
malicious web pages that, when acessed, would crash the browser,
potentially allow remote arbitrary code execution or cause some sort
of unexpected behavior.
The packages from this update are of Mozilla 1.2.1, which is the
latest stable release[10] from mozilla.org and includes fixes for the
known vulnerabilities. Besides the security fixes, it also includes
several new features and other minor corrections.
The vulnerabilities aforementioned also affect the Galeon web
browser, which uses the Mozilla engine. Galeon is being updated to
the version 1.2.7 in Conectiva Linux 8, but not in Conectiva Linux
6.0 and 7.0. The Galeon version distributed in these versions of
Conectiva Linux was in its early stages of development and would not
work with the new Mozilla packages. A new version of Galeon for these
distributions would need many other updated packages and therefore
will not be provided.
http://www.linuxsecurity.com/advisories/connectiva_advisory-2853.html
Hironori Sakamoto, one of the w3m developers, found two security
vulnerabilities in w3m and associated programs. The w3m browser does
not properly escape HTML tags in frame contents and img alt
attributes. A malicious HTML frame or img alt attribute may deceive a
user to send his local cookies which are used for configuration. The
information is not leaked automatically, though.
For the stable distribution (woody) these problems have been fixed in
version 0.3-2.4.
The old stable distribution (potato) is not affected by these
problems.
For the unstable distribution (sid) these problems have been fixed in
version 0.3.2.2-1 and later.
We recommend that you upgrade your w3m and w3m-ssl packages.
http://www.linuxsecurity.com/advisories/debian_advisory-2855.html
The util-linux package provides the mcookie utility, a tool for
generating random cookies that can be used for X authentication. The
util-linux packages that were distributed with Mandrake Linux 8.2 and
9.0 had a patch that made it use /dev/urandom instead of /dev/random,
which resulted in the mcookie being more predictable than it would
otherwise be. This patch has been removed in these updates, giving
mcookie a better source of entropy and making the generated cookies
less predictable. Thanks to Dirk Mueller for pointing this out.
http://www.linuxsecurity.com/advisories/mandrake_advisory-2854.html
Regards
eddie
An insecure use of a temporary file has been found in Python. This erratum
provides updated Python packages.
[updated Feb 12 2003]
Updated packages for Red Hat Linux 7.3 are available that fix a binary
incompatibility change in the original erratum packages that affected
redhat-config-users, and to add back the missing python-tools package.
http://www.linuxsecurity.com/advisories/redhat_advisory-2849.html
Updated PAM packages are now available for Red Hat Linux 7.1, 7.2, 7.3, and
8.0. These packages correct a bug in pam_xauth's handling of authorization
data for the root user.
http://www.linuxsecurity.com/advisories/redhat_advisory-2850.html
New fileutils packages for Red Hat Linux 6.2, 7.0, 7.1, 7.2 and 7.3 fix a
race condition in recursive remove and move commands.
http://www.linuxsecurity.com/advisories/redhat_advisory-2851.html
Hironori Sakamoto, one of the w3m developers, found two security
vulnerabilities in w3m and associated programs. The w3m browser does
not properly escape HTML tags in frame contents and img alt
attributes. A malicious HTML frame or img alt attribute may deceive a
user to send his local cookies which are used for configuration. The
information is not leaked automatically, though.
For the stable distribution (woody) these problems have been fixed in
version 0.3.p23.3-1.5. Please note that the update also contains an
important patch to make the program work on the powerpc platform again.
The old stable distribution (potato) is not affected by these
problems.
For the unstable distribution (sid) these problems have been fixed in
version 0.3.p24.17-3 and later.
We recommend that you upgrade your w3mmee-ssl packages.
http://www.linuxsecurity.com/advisories/debian_advisory-2852.html
Mozilla is an open-source web browser designed for standards
compliance, performance and portability.
This update addresses several vulnerabilities found after the mozilla
1.0rc2 release, wich was the last version sent as an official
update[1] for Conectiva Linux distributions. A complete list of such
vulnerabilities can be obtained in [2,3], and details about the most
known ones in [5,6,7,8,9].
A remote attacker could exploit these vulnerabilities by creating
malicious web pages that, when acessed, would crash the browser,
potentially allow remote arbitrary code execution or cause some sort
of unexpected behavior.
The packages from this update are of Mozilla 1.2.1, which is the
latest stable release[10] from mozilla.org and includes fixes for the
known vulnerabilities. Besides the security fixes, it also includes
several new features and other minor corrections.
The vulnerabilities aforementioned also affect the Galeon web
browser, which uses the Mozilla engine. Galeon is being updated to
the version 1.2.7 in Conectiva Linux 8, but not in Conectiva Linux
6.0 and 7.0. The Galeon version distributed in these versions of
Conectiva Linux was in its early stages of development and would not
work with the new Mozilla packages. A new version of Galeon for these
distributions would need many other updated packages and therefore
will not be provided.
http://www.linuxsecurity.com/advisories/connectiva_advisory-2853.html
Hironori Sakamoto, one of the w3m developers, found two security
vulnerabilities in w3m and associated programs. The w3m browser does
not properly escape HTML tags in frame contents and img alt
attributes. A malicious HTML frame or img alt attribute may deceive a
user to send his local cookies which are used for configuration. The
information is not leaked automatically, though.
For the stable distribution (woody) these problems have been fixed in
version 0.3-2.4.
The old stable distribution (potato) is not affected by these
problems.
For the unstable distribution (sid) these problems have been fixed in
version 0.3.2.2-1 and later.
We recommend that you upgrade your w3m and w3m-ssl packages.
http://www.linuxsecurity.com/advisories/debian_advisory-2855.html
The util-linux package provides the mcookie utility, a tool for
generating random cookies that can be used for X authentication. The
util-linux packages that were distributed with Mandrake Linux 8.2 and
9.0 had a patch that made it use /dev/urandom instead of /dev/random,
which resulted in the mcookie being more predictable than it would
otherwise be. This patch has been removed in these updates, giving
mcookie a better source of entropy and making the generated cookies
less predictable. Thanks to Dirk Mueller for pointing this out.
http://www.linuxsecurity.com/advisories/mandrake_advisory-2854.html
Regards
eddie