SuSE: Weekly Summary 2009:005
Summary
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
______________________________________________________________________________
SUSE Security Summary Report
Announcement ID: SUSE-SR:2009:005
Date: Mon, 02 Mar 2009 13:00:00 +0000
Cross-References: CVE-2007-0062, CVE-2008-5078, CVE-2008-5138
CVE-2009-0021, CVE-2009-0040, CVE-2009-0049
CVE-2009-0386, CVE-2009-0387, CVE-2009-0397
CVE-2009-0478, CVE-2009-0599, CVE-2009-0600
CVE-2009-0601
Content of this advisory:
1) Solved Security Vulnerabilities:
- dhcp
- ntp/xntp
- squid
- wireshark
- libpng
- pam_mount
- enscript
- eID-belgium
- gstreamer-0_10-plugins-good
2) Pending Vulnerabilities, Solutions, and Work-Arounds:
none
3) Authenticity Verification and Additional Information
______________________________________________________________________________
1) Solved Security Vulnerabilities
To avoid flooding mailing lists with SUSE Security Announcements for minor
issues, SUSE Security releases weekly summary reports for the low profile
vulnerability fixes. The SUSE Security Summary Reports do not list or
download URLs like the SUSE Security Announcements that are released for
more severe vulnerabilities.
Fixed packages for the following incidents are already available on our FTP
server and via the YaST Online Update.
- dhcp
By sending requests with a large value for 'dhcp-max-message-size'
dhcp-clients could crash dhcpd if dhcpd was configured with a large
amount of DHCP options (CVE-2007-0062).
Affected Products: SLES9, SLES10, openSUSE 10.3-11.0
- ntp/xntp
ntp didn't properly check the return value of the openssl function
EVP_VerifyFinal (CVE-2009-0021).
Affected Products: SLES9, openSUSE 10.3-11.1
Packages for SLES10 got delayed due a fix for another problem and
will follow soon
- squid
A denial of service condition in HTTP-request processing
was fixed in squid (CVE-2009-0478).
Affected Products: openSUSE 11.1
- wireshark
wireshark could crash while reading capture files containing
NetScreen data (CVE-2009-0599), while reading Tektronix K12 capture
files (CVE-2009-0600) or if the HOME environment variable contained
format string specifiers (CVE-2009-0601).
Affected Products: openSUSE 10.3-11.1
- libpng
Specially crafted png files could crash applications using libpng or
potentially execute arbitrary code by causing free of an
uninitialized pointer (CVE-2009-0040).
Affected Products: SLES9, SLES10, openSUSE 10.3-11.1
- pam_mount
Temporary file handling of the passwdehd script was prone to symlink
attacks (CVE-2008-5138). In 11.0 and 11.1 the script was removed as
it doesn't work on those distributions anyways.
Affected Products: SLES9, SLES10, openSUSE 10.3-11.1
- enscript
long path names could overflow a buffer in enscript (CVE-2008-5078).
Affected Products: SLES9
- eID-belgium
eID-belgium didn't properly check the return value of the openssl
function EVP_VerifyFinal (CVE-2009-0049).
Affected Products: SLES10, openSUSE 10.3-11.1
- gstreamer-0_10-plugins-good
Specially crafted QuickTime media files could cause heap based
buffer overflows in gstreamer. Attackers could potentially exploit
that to execute arbitrary code (CVE-2009-0386, CVE-2009-0387,
CVE-2009-0397).
Affected Products: SLES9, openSUSE 10.3-11.1
______________________________________________________________________________
2) Pending Vulnerabilities, Solutions, and Work-Arounds
none
______________________________________________________________________________
3) Authenticity Verification and Additional Information
- Announcement authenticity verification:
SUSE security announcements are published via mailing lists and on Web
sites. The authenticity and integrity of a SUSE security announcement is
guaranteed by a cryptographic signature in each announcement. All SUSE
security announcements are published with a valid signature.
To verify the signature of the announcement, save it as text into a file
and run the command
gpg --verify
References