SuSE: Weekly Summary 2009:013
Summary
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
______________________________________________________________________________
SUSE Security Summary Report
Announcement ID: SUSE-SR:2009:013
Date: Tue, 11 Aug 2009 14:00:00 +0000
Cross-References: CVE-2008-5518, CVE-2009-0023, CVE-2009-0038
CVE-2009-0039, CVE-2009-0781, CVE-2009-1255
CVE-2009-1373, CVE-2009-1375, CVE-2009-1376
CVE-2009-1494, CVE-2009-1788, CVE-2009-1791
CVE-2009-1889, CVE-2009-1955, CVE-2009-1956
CVE-2009-2185, CVE-2009-2285, CVE-2009-2288
CVE-2009-2415, CVE-2009-2416
Content of this advisory:
1) Solved Security Vulnerabilities:
- memcached
- libtiff/libtiff3
- nagios
- libsndfile
- gaim/finch
- open-, strong, freeswan
- libapr-util1
- websphere-as_ce
- libxml2
2) Pending Vulnerabilities, Solutions, and Work-Arounds:
none
3) Authenticity Verification and Additional Information
______________________________________________________________________________
1) Solved Security Vulnerabilities
To avoid flooding mailing lists with SUSE Security Announcements for minor
issues, SUSE Security releases weekly summary reports for the low profile
vulnerability fixes. The SUSE Security Summary Reports do not list or
download URLs like the SUSE Security Announcements that are released for
more severe vulnerabilities.
Fixed packages for the following incidents are already available on our FTP
server and via the YaST Online Update.
- memcached
This update of memcached fixes a signedness problem which may lead to
a buffer too small to hold all data received from the network, this may
allow arbitrary remote code execution. (CVE-2009-2415)
Additionally an information leak was fixed (CVE-2009-1494,CVE-2009-1255)
Affected products: openSUSE 10.3-11.1, SLE11
- libtiff/libtiff3
This update of libtiff fixes a buffer underflow in LZWDecodeCompat
(CVE-2009-2285).
Affected products: openSUSE 10.3-11.1, SLES9, SLE10, SLE11, NLD9, OES
- nagios
A shell injection bug in nagios' statuswml.cgi CGI script has been fixed.
CVE-2009-2288 has been assigned to this issue.
Affected products: openSUSE 10.3-11.1, SLE10, SLE11
- libsndfile
This update of libsndfile fixes a heap-based buffer overflow in function
voc_read_header() (CVE-2009-1788) and another heap-based buffer overflow
in aiff_read_header() (CVE-2009-1791).
Affected products: openSUSE 10.3-11.1, SLE11
- gaim/fitch
Several bugfixes were done for the Instant Messenger Pidgin:
- Malformed responses to file transfers could cause a buffer overflow in
pidgin (CVE-2009-1373) and specially crafted packets could crash it
(CVE-2009-1375).
- The fix against integer overflows in the msn protocol handling was
incomplete (CVE-2009-1376).
- Fixed misparsing ICQ message as SMS DoS (CVE-2009-1889, Pidgin#9483).
Affected products: openSUSE 10.3-11.1, SLES9, SLE10, SLE11, NLD9
- open-, strong-, freeswan
Two vulnerabilities in the openswan ASN.1 parser (when handling RDNs,
UTCTIME and GENERALIZEDTIME strings) could lead to remote crashes of
the pluto daemon (CVE-2009-2185).
Affected products: openSUSE 10.3-11.1, SLES9, SLE10, SLE11, NLD9
- libapr-util1
This update of libapr-util1 fixes a memory consumption bug in the XML
parser that can cause a remote denial-of-service vulnerability in app-
lications using APR (WebDAV for example) (CVE-2009-1955). Additionally
a one byte buffer overflow in function apr_brigade_vprintf()
(CVE-2009-1956) and buffer underflow in function apr_strmatch_precompile()
(CVE-2009-0023) was fixed too. Depending on the application using this
function it can lead to remote denial of service or information leakage.
Affected products: openSUSE 10.3-11.1, SLE10, SLE11
- websphere-as_ce
This update of WebSphere fixes the following vulnerabilities:
- GERONIMO-3838: close potential denial of service attack
- CVE-2008-5518: fix Apache Geronimo web administration console
directory traversal vulnerabilities.
- CVE-2009-0038: fix Apache Geronimo web administration console
XSS vulnerabilities.
- CVE-2009-0039: fix Apache Geronimo web administration console
XSRF vulnerabilities.
- CVE-2009-0781: Samples: Fix Apache Tomcat cross-site scripting
vulnerability.
Affected products: SLE10, SLE11
- libxml2
This update of libxml2 does not use pointers after they were freed
anymore. (CVE-2009-2416)
Affected products: openSUSE 10.3-11.1, SLES9, SLE10, SLE11, NLD9
______________________________________________________________________________
2) Pending Vulnerabilities, Solutions, and Work-Arounds
none
______________________________________________________________________________
3) Authenticity Verification and Additional Information
- Announcement authenticity verification:
SUSE security announcements are published via mailing lists and on Web
sites. The authenticity and integrity of a SUSE security announcement is
guaranteed by a cryptographic signature in each announcement. All SUSE
security announcements are published with a valid signature.
To verify the signature of the announcement, save it as text into a file
and run the command
gpg --verify
References