Thank you for reading the Linux Advisory Watch Security Newsletter. The purpose of this document is to provide our readers with a quick summary of each week's vendor security bulletins and pointers on methods to improve the security posture of your open source system. Vulnerabilities affect nearly every vendor virtually every week, so be sure to read through to find the updates your distributor have made available.


LinuxSecurity.com Feature Extras:

- Social engineering is the practice of learning and obtaining valuable information by exploiting human vulnerabilities. It is an art of deception that is considered to be vital for a penetration tester when there is a lack of information about the target that can be exploited.

- When you’re dealing with a security incident it’s essential you – and the rest of your team – not only have the skills they need to comprehensively deal with an issue, but also have a framework to support them as they approach it. This framework means they can focus purely on what they need to do, following a process that removes any vulnerabilities and threats in a proper way – so everyone who depends upon the software you protect can be confident that it’s secure and functioning properly.


  (Mar 15)
 

Security Report Summary

  (Mar 14)
 

Security Report Summary

  (Mar 13)
 

Security Report Summary

  (Mar 12)
 

Security Report Summary

  (Mar 9)
 

Security Report Summary

  (Mar 9)
 

Security Report Summary

 
  (Mar 13)
 

Security fix for CVE-2016-9422, CVE-2016-9423, CVE-2016-9424, CVE-2016-9425,CVE-2016-9428, CVE-2016-9426, CVE-2016-9429, CVE-2016-9430, CVE-2016-9431,CVE-2016-9432, CVE-2016-9433, CVE-2016-9434, CVE-2016-9435, CVE-2016-9436,CVE-2016-9437, CVE-2016-9438, CVE-2016-9439, CVE-2016-9440, CVE-2016-9441,CVE-2016-9442, CVE-2016-9443, CVE-2016-9622, CVE-2016-9623, CVE-2016-9624,CVE-2016-9625, CVE-2016-9626, CVE-2016-9627, CVE-2016-9628, CVE-2016-9629,CVE-2016-9631, CVE-2016-9630, CVE-2016-9632, CVE-2016-9633 And new upstream20170102 as well

  (Mar 13)
 

Security fix for integer underflow

  (Mar 13)
 

This update fixes a possible heap buffer overflow.

  (Mar 13)
 

For changes see: https://www.thunderbird.net/en-US/thunderbird/45.8.0/releasenotes/

  (Mar 13)
 

Security update for integer underflow

  (Mar 13)
 

* various security relevant flaws

  (Mar 12)
 

This update fixes a possible heap buffer overflow.

  (Mar 12)
 

For changes see: https://www.thunderbird.net/en-US/thunderbird/45.8.0/releasenotes/

  (Mar 12)
 

Security fix for

  (Mar 12)
 

This kdelibs3 (KDE 3 compatibility libraries) update fixes the security issues:* CVE-2016-6232 (karchive): Extraction of tar files possible to arbitrary systemlocations * CVE-2017-6410 (kio): Information Leak when accessing https whenusing a malicious PAC file for the KDE 3 compatibility libraries. (Securityupdates for KDE Frameworks 5 (kf5-karchive resp. kf5-kio) and for the KDE 4compatibility libraries (kdelibs 4) have already been submitted.) In addition,the KDE 3 compatibility version of KCrash was modified to use the DrKonqi fromPlasma 5 rather than from kde-runtime 4. (The original KDE 3 DrKonqi was alreadydropped years ago.) The kde-runtime 4 DrKonqi is not installed by default andwill be removed entirely in future Fedora versions, the Plasma 5 version ofDrKonqi can also be used for legacy applications.

  (Mar 12)
 

This kdelibs3 (KDE 3 compatibility libraries) update fixes the security issues:* CVE-2016-6232 (karchive): Extraction of tar files possible to arbitrary systemlocations * CVE-2017-6410 (kio): Information Leak when accessing https whenusing a malicious PAC file for the KDE 3 compatibility libraries. (Securityupdates for KDE Frameworks 5 (kf5-karchive resp. kf5-kio) and for the KDE 4compatibility libraries (kdelibs 4) have already been submitted.) In addition,the KDE 3 compatibility version of KCrash was modified to use the DrKonqi fromPlasma 5 rather than from kde-runtime 4. (The original KDE 3 DrKonqi was alreadydropped years ago.) The kde-runtime 4 DrKonqi is not installed by default andwill be removed entirely in future Fedora versions, the Plasma 5 version ofDrKonqi can also be used for legacy applications.

  (Mar 11)
 

This is an update containing several CVE and other bug fixes,

  (Mar 11)
 

Security fix for CVE-2017-6410

  (Mar 11)
 

This is an update containing several CVE and other misc fixes

  (Mar 11)
 

Backport fixes for multiple security vulnerabilities.

  (Mar 10)
 

**Version 2.8.1** * This release contains a fix for a security advisory relatedto the improper handling of shell commands * Uses of shell_exec() and exec()were not escaping filenames and configuration settings in most cases * Aproperly crafted filename or configuration option would allow for arbitrary codeexecution when using some features * All users are encouraged to upgrade tothis version, especially if you are checking 3rd-party code * e.g., yourun PHPCS over libraries that you did not write * e.g., you provide aweb service that runs PHPCS over user-uploaded files or 3rd-party repositories* e.g., you allow external tool paths to be set by user-defined values * Ifyou are unable to upgrade but you check 3rd-party code, ensure you are not usingthe following features: * The diff report * The notify-sendreport * The Generic.PHP.Syntax sniff * TheGeneric.Debug.CSSLint sniff * The Generic.Debug.ClosureLinter sniff* The Generic.Debug.JSHint sniff * The Squiz.Debug.JSLint sniff* The Squiz.Debug.JavaScriptLint sniff * The Zend.Debug.CodeAnalyzersniff * Thanks to Klaus Purer for the report * The PHP-suppliedT_COALESCE_EQUAL token has been replicated for PHP versions before 7.2 *PEAR.Functions.FunctionDeclaration now reports an error for blank lines foundinside a function declaration * PEAR.Functions.FunctionDeclaration no longerreports indent errors for blank lines in a function declaration *Squiz.Functions.MultiLineFunctionDeclaration no longer reports errors for blanklines in a function declaration * It would previously report that only oneargument is allowed per line * Squiz.Commenting.FunctionComment now correctsmulti-line param comment padding more accurately *Squiz.Commenting.FunctionComment now properly fixes pipe-separated param types *Squiz.Commenting.FunctionComment now works correctly when function return typesalso contain a comment * Thanks to Juliette Reinders Folmer for the patch *Squiz.ControlStructures.InlineIfDeclaration now supports the elvis operator* As this is not a real PHP operator, it enforces no spaces between ? and : whenthe THEN statement is empty * Squiz.ControlStructures.InlineIfDeclaration is nowable to fix the spacing errors it reports * Fixed bug #1340 : STDIN filecontents not being populated in some cases * Thanks to David Bi?ovec for thepatch * Fixed bug #1344 : PEAR.Functions.FunctionCallSignatureSniff throws errorfor blank comment lines * Fixed bug #1347 : PSR2.Methods.FunctionCallSignaturestrips some comments during fixing * Thanks to Algirdas Gurevicius for thepatch * Fixed bug #1349 : Squiz.Strings.DoubleQuoteUsage.NotRequired message isbadly formatted when string contains a CR newline char * Thanks to AlgirdasGurevicius for the patch * Fixed bug #1350 : InvalidSquiz.Formatting.OperatorBracket error when using namespaces * Fixed bug #1369 :Empty line in multi-line function declaration cause infinite loop

  (Mar 10)
 

CVE-2017-6188: Upstream PR 797: Fix wrong parameter expansion in CGI

  (Mar 10)
 

- new upstream version (52.0)

  (Mar 10)
 

**Version 2.8.1** * This release contains a fix for a security advisory relatedto the improper handling of shell commands * Uses of shell_exec() and exec()were not escaping filenames and configuration settings in most cases * Aproperly crafted filename or configuration option would allow for arbitrary codeexecution when using some features * All users are encouraged to upgrade tothis version, especially if you are checking 3rd-party code * e.g., yourun PHPCS over libraries that you did not write * e.g., you provide aweb service that runs PHPCS over user-uploaded files or 3rd-party repositories* e.g., you allow external tool paths to be set by user-defined values * Ifyou are unable to upgrade but you check 3rd-party code, ensure you are not usingthe following features: * The diff report * The notify-sendreport * The Generic.PHP.Syntax sniff * TheGeneric.Debug.CSSLint sniff * The Generic.Debug.ClosureLinter sniff* The Generic.Debug.JSHint sniff * The Squiz.Debug.JSLint sniff* The Squiz.Debug.JavaScriptLint sniff * The Zend.Debug.CodeAnalyzersniff * Thanks to Klaus Purer for the report * The PHP-suppliedT_COALESCE_EQUAL token has been replicated for PHP versions before 7.2 *PEAR.Functions.FunctionDeclaration now reports an error for blank lines foundinside a function declaration * PEAR.Functions.FunctionDeclaration no longerreports indent errors for blank lines in a function declaration *Squiz.Functions.MultiLineFunctionDeclaration no longer reports errors for blanklines in a function declaration * It would previously report that only oneargument is allowed per line * Squiz.Commenting.FunctionComment now correctsmulti-line param comment padding more accurately *Squiz.Commenting.FunctionComment now properly fixes pipe-separated param types *Squiz.Commenting.FunctionComment now works correctly when function return typesalso contain a comment * Thanks to Juliette Reinders Folmer for the patch *Squiz.ControlStructures.InlineIfDeclaration now supports the elvis operator* As this is not a real PHP operator, it enforces no spaces between ? and : whenthe THEN statement is empty * Squiz.ControlStructures.InlineIfDeclaration is nowable to fix the spacing errors it reports * Fixed bug #1340 : STDIN filecontents not being populated in some cases * Thanks to David Bi?ovec for thepatch * Fixed bug #1344 : PEAR.Functions.FunctionCallSignatureSniff throws errorfor blank comment lines * Fixed bug #1347 : PSR2.Methods.FunctionCallSignaturestrips some comments during fixing * Thanks to Algirdas Gurevicius for thepatch * Fixed bug #1349 : Squiz.Strings.DoubleQuoteUsage.NotRequired message isbadly formatted when string contains a CR newline char * Thanks to AlgirdasGurevicius for the patch * Fixed bug #1350 : InvalidSquiz.Formatting.OperatorBracket error when using namespaces * Fixed bug #1369 :Empty line in multi-line function declaration cause infinite loop

  (Mar 10)
 

CVE-2017-6188: Upstream PR 797: Fix wrong parameter expansion in CGI

  (Mar 9)
 

- new upstream version (52.0)

  (Mar 9)
 

Backport fixes for multiple security vulnerabilities.

  (Mar 9)
 

* [7.x-3.15](https://www.drupal.org/project/views/releases/7.x-3.15) *[Moderately Critical - Access Bypass - SA-CONTRIB-2017-022](https://www.drupal.org/node/2854980)

  (Mar 9)
 

Knot Resolver 1.2.3 (2017-02-23) ================================ Bugfixes-------- - Disable storing GLUE records into the cache even in the (non-default) QUERY_PERMISSIVE mode - iterate: skip answer RRs that don't match thequery - layer/iterate: some additional processing for referrals - lib/resolve:zonecut fetching error was fixed Knot Resolver 1.2.2 (2017-02-10)================================ Bugfixes: --------- - Fix -k argumentprocessing to avoid out-of-bounds memory accesses - lib/resolve: fix zonecutfetching for explicit DS queries - hints: more NULL checks - Fix TAbootstrapping for multiple TAs in the IANA XML file Testing: -------- - Updatetests to run tests with and without QNAME minimization Knot Resolver 1.2.1(2017-02-01) ==================================== Security: --------- - Undercertain conditions, a cached negative answer from a CD query would be reusedto construct response for non-CD queries, resulting in Insecure status insteadof Bogus. Only 1.2.0 release was affected. Documentation ------------- -Update the typo in the documentation: The query trace policy is namedpolicy.QTRACE (and not policy.TRACE) Bugfixes: --------- - lua: make the mapcommand check its arguments Knot DNS 2.4.1 (2017-02-10)=========================== Bugfixes: -------- - Transfer of a huge rrset goesinto an infinite loop - Huge response over TCP contains useless TC bit insteadof SERVFAIL - Failed to build utilities with disabled daemon - Memory leaksduring keys removal - Rough TSIG packet reservation causes early truncation -Minor out-of-bounds string termination write in rrset dump - Server crashduring stop if failed to open timers DB - Poor minimum UDP-max-sizeconfiguration check - Failed to receive one-record-per-message IXFR-style AXFR- Kdig timeouts when receiving RCODE != NOERROR on subsequent transfer messageImprovements: ------------- - Speed-up of rdata addition into a huge rrset -Introduce check of minumum timeout for next refresh - Dnsproxy module canforward all queries without local resolving ---- Latest upstream release.Includes bugfixes for DNSSEC key management. ---- Latest upstream versionswith bunch of impotant bugfixes.

  (Mar 9)
 

Knot Resolver 1.2.3 (2017-02-23) ================================ Bugfixes-------- - Disable storing GLUE records into the cache even in the (non-default) QUERY_PERMISSIVE mode - iterate: skip answer RRs that don't match thequery - layer/iterate: some additional processing for referrals - lib/resolve:zonecut fetching error was fixed Knot Resolver 1.2.2 (2017-02-10)================================ Bugfixes: --------- - Fix -k argumentprocessing to avoid out-of-bounds memory accesses - lib/resolve: fix zonecutfetching for explicit DS queries - hints: more NULL checks - Fix TAbootstrapping for multiple TAs in the IANA XML file Testing: -------- - Updatetests to run tests with and without QNAME minimization Knot Resolver 1.2.1(2017-02-01) ==================================== Security: --------- - Undercertain conditions, a cached negative answer from a CD query would be reusedto construct response for non-CD queries, resulting in Insecure status insteadof Bogus. Only 1.2.0 release was affected. Documentation ------------- -Update the typo in the documentation: The query trace policy is namedpolicy.QTRACE (and not policy.TRACE) Bugfixes: --------- - lua: make the mapcommand check its arguments Knot DNS 2.4.1 (2017-02-10)=========================== Bugfixes: -------- - Transfer of a huge rrset goesinto an infinite loop - Huge response over TCP contains useless TC bit insteadof SERVFAIL - Failed to build utilities with disabled daemon - Memory leaksduring keys removal - Rough TSIG packet reservation causes early truncation -Minor out-of-bounds string termination write in rrset dump - Server crashduring stop if failed to open timers DB - Poor minimum UDP-max-sizeconfiguration check - Failed to receive one-record-per-message IXFR-style AXFR- Kdig timeouts when receiving RCODE != NOERROR on subsequent transfer messageImprovements: ------------- - Speed-up of rdata addition into a huge rrset -Introduce check of minumum timeout for next refresh - Dnsproxy module canforward all queries without local resolving ---- Latest upstream release.Includes bugfixes for DNSSEC key management. ---- Latest upstream versionswith bunch of impotant bugfixes.

  (Mar 9)
 

* [7.x-3.15](https://www.drupal.org/project/views/releases/7.x-3.15) *[Moderately Critical - Access Bypass - SA-CONTRIB-2017-022](https://www.drupal.org/node/2854980)

 
  (Mar 15)
 

An update for tomcat6 is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which [More...]

  (Mar 15)
 

An update for rabbitmq-server is now available for Red Hat Enterprise Linux OpenStack Platform 6.0 (Juno) for RHEL 7. Red Hat Product Security has rated this update as having a security impact [More...]

  (Mar 15)
 

An update for policycoreutils is now available for Red Hat Enterprise Linux 7.1 Extended Update Support. Red Hat Product Security has rated this update as having a security impact [More...]

  (Mar 15)
 

An update for policycoreutils is now available for Red Hat Enterprise Linux 7.2 Extended Update Support. Red Hat Product Security has rated this update as having a security impact [More...]

  (Mar 15)
 

An update for rabbitmq-server is now available for Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6. Red Hat Product Security has rated this update as having a security impact [More...]

  (Mar 15)
 

An update for rabbitmq-server is now available for Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 7. Red Hat Product Security has rated this update as having a security impact [More...]

  (Mar 15)
 

An update for flash-plugin is now available for Red Hat Enterprise Linux 6 Supplementary. Red Hat Product Security has rated this update as having a security impact [More...]

  (Mar 15)
 

An update for rabbitmq-server is now available for Red Hat Enterprise Linux OpenStack Platform 7.0 (Kilo) for RHEL 7. Red Hat Product Security has rated this update as having a security impact [More...]

  (Mar 14)
 

An update for kernel is now available for Red Hat Enterprise Linux 7.2 Extended Update Support. Red Hat Product Security has rated this update as having a security impact [More...]

  (Mar 14)
 

An update for chromium-browser is now available for Red Hat Enterprise Linux 6 Supplementary. Red Hat Product Security has rated this update as having a security impact [More...]

 
  (Mar 16)
 

New pidgin packages are available for Slackware 13.0, 13.1, 13.37, 14.0, 14.1, 14.2, and -current to fix a security issue. [More Info...]

 
  Ubuntu: 3224-1: LXC vulnerability (Mar 9)
 

LXC could be made to create arbitrary virtual network interfaces as anadministrator.