SuSE: Weekly Summary 2009:007
Summary
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
______________________________________________________________________________
SUSE Security Summary Report
Announcement ID: SUSE-SR:2009:007
Date: Tue, 24 Mar 2009 16:00:00 +0000
Cross-References: CVE-2007-6018, CVE-2008-2364, CVE-2008-2712
CVE-2008-3074, CVE-2008-3075, CVE-2008-3076
CVE-2008-4677, CVE-2008-5917, CVE-2008-6235
CVE-2009-0115, CVE-2009-0499, CVE-2009-0500
CVE-2009-0501, CVE-2009-0502, CVE-2009-0581
CVE-2009-0583, CVE-2009-0584, CVE-2009-0723
CVE-2009-0733, CVE-2009-0914, CVE-2009-0915
CVE-2009-0916, CVE-2009-0930, CVE-2009-0932
Content of this advisory:
1) Solved Security Vulnerabilities:
- vim, gvim
- apache2
- opera
- multipath tools
- java-1_6_0-openjdk
- imp
- horde
- lcms
- moodle
- ghostscript
2) Pending Vulnerabilities, Solutions, and Work-Arounds:
- NetworkManager
3) Authenticity Verification and Additional Information
______________________________________________________________________________
1) Solved Security Vulnerabilities
To avoid flooding mailing lists with SUSE Security Announcements for minor
issues, SUSE Security releases weekly summary reports for the low profile
vulnerability fixes. The SUSE Security Summary Reports do not list or
download URLs like the SUSE Security Announcements that are released for
more severe vulnerabilities.
Fixed packages for the following incidents are already available on our FTP
server and via the YaST Online Update.
- vim, gvim
The VI Improved editor (vim) was prone to several security problems:
CVE-2008-4677: The netrw plugin sent credentials to all servers.
CVE-2008-2712: Arbitrary code execution in vim helper plugins
filetype, zip, xpm, gzip and netrw.
CVE-2008-3074: tarplugin code injection
CVE-2008-3075: zipplugin code injection
CVE-2008-3076: several netrw bugs, code injection
CVE-2008-6235: code injection in the netrw plugin
CVE-2008-4677: credential disclosure by netrw plugin
Affected Products: openSUSE 10.3-11.1, SLES9, SLES10
On openSUSE vim was upgraded to version 7.2.108 to fix those issues.
SLES9 and 10 were only affected by a subset, patches were backported
to fix the problems.
- apache2
A DoS condition in apache2's mod_proxy has been fixed
(CVE-2008-2364).
Affected Products: openSUSE 10.3
- opera
Opera 9.64 is a recommended security and stability upgrade,
incorporating the Opera Presto 2.1.1 user agent engine. Opera highly
recommends all users to upgrade to Opera 9.64 to take advantage of
these improvements (CVE-2009-0914, CVE-2009-0915, CVE-2009-0916).
A detailed changelog can be found at
https://help.opera.com/en/latest/
- multipath tools
/var/run/multipathd.sock was world-writable allowing local users to
issue commands to the multipath daemon (CVE-2009-0115).
Affected Products: openSUSE 10.3-11.0, SLES10
- java-1_6_0-openjdk
Specially crafted image files could cause an integer overflow in the
lcms library contained in openjdk. Attackers could potentially
exploit that to crash applications using lcms or even execute
arbitrary code (CVE-2009-0723, CVE-2009-0581, CVE-2009-0733).
Previous update packages contained broken dependencies and couldn't
be installed. Therefore the update had to be re-released.
Affected Products: openSUSE 11.0 and 11.1
- imp
Version update to IMP 4.1.6 fixes a problem with validating HTTP requests that
allowed attackers to delete emails (CVE-2007-6018) and some
cross-site-scripting issues (CVE-2009-0930).
Affected Products: openSUSE 10.3-11.0
- horde
Version update to horde 3.1.9 fixes a cross-site-scripting (XSS) issue
(CVE-2008-5917) and an include file problem (CVE-2009-0932).
Affected Products: openSUSE 10.3-11.0
- lcms
Specially crafted image files could cause an integer overflow in
lcms. Attackers could potentially exploit that to crash applications
using lcms or even execute arbitrary code (CVE-2009-0723,
CVE-2009-0581, CVE-2009-0733).
Affected Products: openSUSE 10.3-11.1, SLES9, SLES10
- moodle
moodle was prone to several cross-site-scripting (XSS) and
cross-site-request-forgery (CSRF) problems (CVE-2009-0499, CVE-2009-0500,
CVE-2009-0501, CVE-2009-0502).
Affected Products: openSUSE 10.3-11.0
- ghostscript
Integer overflows and missing upper bounds checks in Ghostscript's
ICC library potentially allowed attackers to crash Ghostscript or
even cause execution of arbitrary code via specially crafted PS or
PDF files (CVE-2009-0583, CVE-2009-0584).
Affected Products: openSUSE 10.3-11.0, SLES9, SLES10
______________________________________________________________________________
2) Pending Vulnerabilities, Solutions, and Work-Arounds
- NetworkManager
The NetworkManager update caused WLAN to stop working on some
systems. Those systems most likely have a stale directory
/var/run/dbus/at_console/root. It's most likely a leftover from a
root session. Removing the directory and restarting networking
should fix the problems. Please avoid logging in as root in the future.
______________________________________________________________________________
3) Authenticity Verification and Additional Information
- Announcement authenticity verification:
SUSE security announcements are published via mailing lists and on Web
sites. The authenticity and integrity of a SUSE security announcement is
guaranteed by a cryptographic signature in each announcement. All SUSE
security announcements are published with a valid signature.
To verify the signature of the announcement, save it as text into a file
and run the command
gpg --verify
References