SuSE: Weekly Summary 2010:007
Summary
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
______________________________________________________________________________
SUSE Security Summary Report
Announcement ID: SUSE-SR:2010:007
Date: Tue, 30 Mar 2010 10:00:00 +0000
Cross-References: CVE-2008-6514, CVE-2008-7247, CVE-2009-1299
CVE-2009-2563, CVE-2009-2855, CVE-2009-3553
CVE-2009-4019, CVE-2009-4028, CVE-2009-4030
CVE-2009-4376, CVE-2009-4377, CVE-2009-4484
CVE-2010-0302, CVE-2010-0304, CVE-2010-0308
CVE-2010-0393, CVE-2010-0424, CVE-2010-0547
CVE-2010-0628, CVE-2010-0736, CVE-2010-0926
Content of this advisory:
1) Solved Security Vulnerabilities:
- cifs-mount/samba
- compiz-fusion-plugins-main
- cron
- cups
- ethereal/wireshark
- krb5
- mysql
- pulseaudio
- squid/squid3
- viewvc
2) Pending Vulnerabilities, Solutions, and Work-Arounds:
none
3) Authenticity Verification and Additional Information
______________________________________________________________________________
1) Solved Security Vulnerabilities
To avoid flooding mailing lists with SUSE Security Announcements for minor
issues, SUSE Security releases weekly summary reports for the low profile
vulnerability fixes. The SUSE Security Summary Reports do not list or
download URLs like the SUSE Security Announcements that are released for
more severe vulnerabilities.
Fixed packages for the following incidents are already available on our FTP
server and via the YaST Online Update.
- cifs-mount/samba
With enabled "wide links" samba follows symbolic links on the server
side, therefore allowing clients to overwrite arbitrary files
(CVE-2010-0926). This update changes the default setting to have
"wide links" disabled by default. The new default only works if
"wide links" is not set explicitly in smb.conf.
Due to a race condition in mount.cifs a local attacker could corrupt
/etc/mtab if mount.cifs is installed setuid root. mount.cifs is not
setuid root by default and it's not recommended to change that
(CVE-2010-0547).
Affected products: SLE 11, openSUSE 11.0-11.2
- compiz-fusion-plugins-main
The expo plugin in Compiz Fusion allowed local users with physical access
to bypass the screen-saver by just dragging it aside. (CVE-2008-6514:
CVSS v2 Base Score: 6.2)
Affected products: SLE 11, openSUSE 11.0-11.2
- cron
This update of cron fixes a race condition in crontab that can be used to
change the time-stamp of arbitrary files while editing the crontab entry.
CVE-2010-0424: CVSS v2 Base Score: 3.6
Additionally the return value of initgroups() is verified now.
Affected products: SLE 10 SP2+SP3 , SLE 11, openSUSE 11.0-11.2,
Moblin 2.0-2.1
- cups
lppasswd when running setuid or setgid still honors environment variables
that specify the location of message files. Local attackers could exploit
that to gather information by using crafted format strings
(CVE-2010-0393).
The previous fix for a use-after-free vulnerability (CVE-2009-3553) was
incomplete (CVE-2010-0302).
Affected products: SLE 11, openSUSE 11.0-11.2, Moblin 2.0-2.1
- ethereal/wireshark
This update of ethereal fixes:
- CVE-2009-4376: Remote attackers could potentially trigger a buffer
overflow in the Daintree SNA file parser.
- CVE-2009-4377: Specially crafted packets could cause the SMB and SMB2
dissector to crash wireshark.
- CVE-2009-2563: Unspecified vulnerability in the Infiniband dissector
allows remote attackers to cause a denial of service.
- CVE-2010-0304: Several buffer overflows in the LWRES dissector.
Affected products: SLES 9, SLE 10 SP2+SP3, SLE 11, openSUSE 11.0-11.2
- krb5
MITKRB5-SA-2010-002: unauthenticated remote attacker could cause a
GSS-API application including the Kerberos administration daemon
(kadmind) to crash.
CVE-2010-0628 has been assigned to this issue.
Affected products: openSUSE 11.2
- mysql
- fixing various security issues (bnc#557669)
- upstream #47320 - checking server certificates (CVE-2009-4028)
- upstream #48291 - error handling in subqueries (CVE-2009-4019)
- upstream #47780 - preserving null_value flag in GeomFromWKB()
(CVE-2009-4019)
- upstream #39277 - symlink behaviour fixed (CVE-2008-7247)
- upstream #32167 - symlink behaviour refixed (CVE-2009-4030)
- fixing remote buffer overflow (CVE-2009-4484)
Affected products: SLE 10 SP2+SP3
- pulseaudio
Due to a race condition in pulseaudio a local attacker could make
pulseaudio change ownership and permissions of arbitrary files.
The problem is only security relevant if pulseaudio is run in
"system mode" which is not the case by default (CVE-2009-1299).
Affected products: openSUSE 11.0-11.2
- squid/squid3
The following vulnerabilities have been fixed in squid:
- CVE-2009-2855: DoS via special crafted auth header
- CVE-2010-0308: DoS via invalid DoS header
Affected products: SLES 9, SLE 10 SP2+SP3, SLE 11, openSUSE 11.0-11.2
- viewvc
Query forms didn't escape user provided input, therefore allowing
cross-site-scripting (XSS) attacks.
CVE-2010-0736 has been assigned to this issue.
Affected products: openSUSE 11.0-11.2
______________________________________________________________________________
2) Pending Vulnerabilities, Solutions, and Work-Arounds
none
______________________________________________________________________________
3) Authenticity Verification and Additional Information
- Announcement authenticity verification:
SUSE security announcements are published via mailing lists and on Web
sites. The authenticity and integrity of a SUSE security announcement is
guaranteed by a cryptographic signature in each announcement. All SUSE
security announcements are published with a valid signature.
To verify the signature of the announcement, save it as text into a file
and run the command
gpg --verify
References