SuSE: Weekly Summary 2009:001
Summary
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
______________________________________________________________________________
SUSE Security Summary Report
Announcement ID: SUSE-SR:2009:001
Date: Mon, 12 Jan 2009 13:00:00 +0000
Cross-References: CVE-2008-2380, CVE-2008-3933, CVE-2008-3934
CVE-2008-3963, CVE-2008-4097, CVE-2008-4098
CVE-2008-4225, CVE-2008-4314, CVE-2008-4552
CVE-2008-4575, CVE-2008-4639, CVE-2008-4640
CVE-2008-4641, CVE-2008-4680, CVE-2008-4681
CVE-2008-4682, CVE-2008-4683, CVE-2008-4684
CVE-2008-4685, CVE-2008-4864, CVE-2008-5006
CVE-2008-5031, CVE-2008-5285, CVE-2008-5514
CVE-2008-5517, CVE-2008-5617
Content of this advisory:
1) Solved Security Vulnerabilities:
- ethereal, wireshark
- mysql
- imap
- rsyslog
- courier-authlib
- nfs-utils
- libxml2
- python
- jhead
- git
- samba
- vinagre
- opera
2) Pending Vulnerabilities, Solutions, and Work-Arounds:
3) Authenticity Verification and Additional Information
______________________________________________________________________________
1) Solved Security Vulnerabilities
To avoid flooding mailing lists with SUSE Security Announcements for minor
issues, SUSE Security releases weekly summary reports for the low profile
vulnerability fixes. The SUSE Security Summary Reports do not list or
download URLs like the SUSE Security Announcements that are released for
more severe vulnerabilities.
Fixed packages for the following incidents are already available on our FTP
server and via the YaST Online Update.
- ethereal, wireshark
An update of wireshark/ethereal was released to fix various vulnerabili-
ties:
CVE-2008-3933 (crash when processing compressed data),
CVE-2008-3934 (crash when processing rf5 files),
CVE-2008-4680 (USB dissector crash),
CVE-2008-4681 (Bluetooth RFCOMM dissector crash),
CVE-2008-4682 (Tamos CommView dissector crash),
CVE-2008-4683 (Bluetooth ACL dissector crash),
CVE-2008-4684 (PRP and MATE dissector crash) and
CVE-2008-4685 (Q.931 dissector crash).
CVE-2008-5285 (SMTP dissector infinite loop)
and an infinite loop problem in the WLCCP dissector
Affected products: openSUSE 10.3-11.1, NLD 9 SDK, Novell Linux POS 9,
Open Enterprise Server, SLES 9, SLE SDK 10 SP2, SLED 10 SP2, SLES 10 SP2
- mysql
Due a flaw users could access tables of other users (CVE-2008-4097,
CVE-2008-4098); additionally empty bit-strings in a query could crash
the MySQL server (CVE-2008-3963)
Affected products: openSUSE 10.3-11.0, NLD 9 SDK, Novell Linux Desktop 9,
Novell Linux POS 9, Open Enterprise Server, SLES 9, SLES SDK 9
- imap
Insufficient buffer length checks in the imap client library may
crash applications that use the library to print formatted email
addresses. The imap daemon itself is not affected but certain
versions of e.g. the php imap module are (CVE-2008-5514).
The client library could also crash when a rogue server unexpectedly
closes the connection (CVE-2008-5006).
Affected products: openSUSE 10.3-11.1
- rsyslog
rsyslog ignored the $AllowedSender configuration directive,
therefore accepting log messages from anyone (CVE-2008-5617).
Additionally imudp logged a message when unauthorized senders tried
to send to it, therefore allowing attackers to flood the log
CVE-2008-5618).
Affected products: openSUSE 11.1
- courier-authlib
Insufficient quoting allowed attackers to inject SQL statements when
using the pgsql backend (CVE-2008-2380).
Affected products: openSUSE 10.3-11.1
- nfs-utils
This update of nfs-utils fixes the handling of the tcp wrapper ACLs.
(CVE-2008-4552)
Affected products: Novell Linux Desktop 9, Novell Linux POS 9, Open
Enterprise Server, SLE 10 DEBUGINFO SP2, SLED 10 SP2, SLES 10 SP2,
SLES 9
- libxml2
libxml2 could run into an endless loop when processing specially
crafted XML files (CVE-2008-4225)
Affected products: NLD 9 SDK, Novell Linux Desktop 9, Novell Linux POS 9,
Open Enterprise Server, SLES 9, SLES SDK 9, SuSE Linux Enterprise Server 8
for IBM S/390 and IBM zSeries, SuSE Linux Enterprise Server 8 for x86,
SLE 10 DEBUGINFO SP2, SLED 10 SP1, SLED 10 SP2, SLES 10 SP1, SLES 10 SP2
- python
Integer Overflows in the python imageop module and in the expandtabs method
potentially allowed attackers to execute arbitrary code (CVE-2008-4864,
CVE-2008-5031)
Affected products: openSUSE 10.3-11.0, Novell Linux Desktop 9, Novell Linux
POS 9, Open Enterprise Server, SLES 9, SLE SDK 10 SP2, SLED 10 SP2,
SLES 10 SP2
- jhead
An update of jhead fixes several security problems:
- CVE-2008-4575: buffer overflow in DoCommand()
- CVE-2008-4639: local symlink attack
- CVE-2008-4640: DoCommand() allowed deletion of arbitrary files
- CVE-2008-4641: execution of arbitrary shell commands in DoCommand()
Affected products: openSUSE 10.3-11.1
- git
Insufficient quoting of shell characters allowed remote attackers to
execute arbitrary commands via the git web interface (CVE-2008-5517)
Affected products: openSUSE 10.3
- samba
This update of samba fixes a bug that allowed the client to retrieve
arbitrary memory content from the server process. (CVE-2008-4314)
Additionally another bug was fixed that affects environments that
enabled registry shares by setting "registry shares = yes". In this case
an authenticated user is accidently allowed to access the root file-
system "/". (CVE-2009-0022)
Affected products: openSUSE 10.3-11.1
- vinagre
A format string problem in vinagre potentially allowed malicious VNC
servers to have a vinagre client that connects to the server execute
arbitrary code. (CVE-2008-5660)
Affected products: openSUSE 11.0-11.1
- opera
Opera 9.63 fixes the following security problems:
- Manipulating text input contents can allow execution of
arbitrary code
- HTML parsing flaw can cause Opera to execute arbitrary code.
- Long hostnames in file: URLs can cause execution of arbitrary
code.
- Script injection in feed preview can reveal contents of unrelated
news feeds.
- Built-in XSLT templates can allow cross-site scripting.
- Fixed an issue that could reveal random data.
- SVG images embedded using tags can no longer execute Java or
plugin content.
Affected products: openSUSE 10.3-11.1
______________________________________________________________________________
2) Pending Vulnerabilities, Solutions, and Work-Arounds
none
______________________________________________________________________________
3) Authenticity Verification and Additional Information
- Announcement authenticity verification:
SUSE security announcements are published via mailing lists and on Web
sites. The authenticity and integrity of a SUSE security announcement is
guaranteed by a cryptographic signature in each announcement. All SUSE
security announcements are published with a valid signature.
To verify the signature of the announcement, save it as text into a file
and run the command
gpg --verify
References