SuSE: Weekly Summary 2009:008
Summary
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
______________________________________________________________________________
SUSE Security Summary Report
Announcement ID: SUSE-SR:2009:008
Date: Mon, 06 Apr 2009 15:00:00 +0000
Cross-References: CVE-2008-0928, CVE-2008-1945, CVE-2008-2025
CVE-2008-2382, CVE-2008-4311, CVE-2008-4539
CVE-2008-5498, CVE-2008-5557, CVE-2008-5714
CVE-2009-0021, CVE-2009-0115, CVE-2009-0186
CVE-2009-0754, CVE-2009-1148, CVE-2009-1149
CVE-2009-1150, CVE-2009-1151
Content of this advisory:
1) Solved Security Vulnerabilities:
- multipath-tools
- bluez
- xntp
- apache-mod_php4
- apache2-mod_php5
- struts
- qemu
- libsndfile
- phpMyAdmin
2) Pending Vulnerabilities, Solutions, and Work-Arounds:
none
3) Authenticity Verification and Additional Information
______________________________________________________________________________
1) Solved Security Vulnerabilities
To avoid flooding mailing lists with SUSE Security Announcements for minor
issues, SUSE Security releases weekly summary reports for the low profile
vulnerability fixes. The SUSE Security Summary Reports do not list or
download URLs like the SUSE Security Announcements that are released for
more severe vulnerabilities.
Fixed packages for the following incidents are already available on our FTP
server and via the YaST Online Update.
- multipath-tools
Default permissions on the multipathd socket file were to generous
and allowed any user to connect (CVE-2009-0115).
Affected products: SLES9, OES, NLD9
- bluez
The dbus package used a too permissive configuration. Therefore intended
access control for some services was not applied (CVE-2008-4311).
The new configuration denies access by default. Some dbus services may
break due to this setting and need an updated configuration as well.
Affected products: openSUSE 10.3
- xntp
ntp didn't properly check the return value of the openssl function
EVP_VerifyFinal (CVE-2009-0021).
Additionally a problem where ntpd refused to use keys from /etc/ntp.keys
has been fixed.
Affected products: SLES10-SP2
- apache-mod_php4
Specially crafted strings could trigger a heap based buffer overflow
in the php mbstring extension. Attackers could potenially exploit
that to execute arbitrary code (CVE-2008-5557).
Affected products: SLES9, OES
- apache2-mod_php5
php 5.2.9 fixes among other things some security issues:
+ Missing bounds checks of an error in the imageRotate function of
the gd extension potentially allowed attackers to read portions of
memory (CVE-2008-5498).
+ the mbstring.func_overload in .htaccess was applied to other virtual
hosts on th same machine (CVE-2009-0754)
Affected products: openSUSE 10.3-11.1, SLES10, SLES11
- struts
Insufficient quoting of parameters allowed attackers to conduct
cross site scripting (XSS) attacks (CVE-2008-2025).
Affected products: openSUSE 10.3-11.1, SLES10, SLES11
- qemu
qemu update to version 0.10.1 fixes the following security issues:
+ CVE-2008-0928: problems with range checks of block devices
+ CVE-2008-1945: problems with removable media handling
+ CVE-2008-2382: vnc server DoS
+ CVE-2008-4539: fix a heap overflow in the cirrus VGA implementation
+ CVE-2008-5714: off by one error in vnc password handling
Affected products: openSUSE 10.3-11.1, SLES10, SLES11
- libsndfile
Specially crafted CAF files could cause an integer overflow in
libsndfile (CVE-2009-0186).
Affected products: openSUSE 10.3-11.1, SLES10, SLES11
- phpMyAdmin
This update of phpMyAdmin fixes multiple vulnerabilities:
+ CVE-2009-1148: directory traversal
+ CVE-2009-1149: CRLF injection
+ CVE-2009-1150: cross-site scripting
+ CVE-2009-1151: static code injection
Affected products: openSUSE 10.3-11.0
______________________________________________________________________________
2) Pending Vulnerabilities, Solutions, and Work-Arounds
none
______________________________________________________________________________
3) Authenticity Verification and Additional Information
- Announcement authenticity verification:
SUSE security announcements are published via mailing lists and on Web
sites. The authenticity and integrity of a SUSE security announcement is
guaranteed by a cryptographic signature in each announcement. All SUSE
security announcements are published with a valid signature.
To verify the signature of the announcement, save it as text into a file
and run the command
gpg --verify
References