Linux Advisory Watch: March 27th, 2015

Advisories

Linux Advisory Watch: March 27th, 2015

Thank you for reading the Linux Advisory Watch Security Newsletter. The purpose of this document is to provide our readers with a quick summary of each week's vendor security bulletins and pointers on methods to improve the security posture of your open source system. Vulnerabilities affect nearly every vendor virtually every week, so be sure to read through to find the updates your distributor have made available.

LinuxSecurity.com Feature Extras:

Peter Smith Releases Linux Network Security Online - Thanks so much to Peter Smith for announcing on linuxsecurity.com the release of his Linux Network Security book available free online. "In 2005 I wrote a book on Linux security. 8 years later and the publisher has gone out of business. Now that I'm free from restrictions on reproducing material from the book, I have decided to make the entire book available online."

Securing a Linux Web Server - With the significant prevalence of Linux web servers globally, security is often touted as a strength of the platform for such a purpose. However, a Linux based web server is only as secure as its configuration and very often many are quite vulnerable to compromise. While specific configurations vary wildly due to environments or specific use, there are various general steps that can be taken to insure basic security considerations are in place.


Debian: 3205-1: batik: Summary (Mar 27)

Security Report Summary

Debian: 3197-2: openssl: Summary (Mar 24)

Security Report Summary

Debian: 3204-1: python-django: Summary (Mar 24)

Security Report Summary

Debian: 3203-1: tor: Summary (Mar 22)

Security Report Summary

Debian: 3202-1: mono: Summary (Mar 22)

Security Report Summary

Debian: 3201-1: iceweasel: Summary (Mar 22)

Security Report Summary

Debian: 3200-1: drupal7: Summary (Mar 20)

Security Report Summary

Debian: 3199-1: xerces-c: Summary (Mar 20)

Security Report Summary

Debian: 3198-1: php5: Summary (Mar 20)

Security Report Summary

Debian: 3197-1: openssl: Summary (Mar 19)

Security Report Summary


Gentoo: 201503-12 Chromium: Multiple vulnerabilities (Mar 22)

Multiple vulnerabilities have been found in Chromium, the worst of which can allow remote attackers to cause Denial of Service or bypass security restrictions.


Mandriva: 2015:062: openssl (Mar 27)

Multiple vulnerabilities has been discovered and corrected in openssl: Race condition in the ssl3_read_bytes function in s3_pkt.c in OpenSSL through 1.0.1g, when SSL_MODE_RELEASE_BUFFERS is enabled, allows remote attackers to inject data across sessions or cause a denial of [More...]


Red Hat: 2015:0729-01: setroubleshoot: Important Advisory (Mar 26)

Updated setroubleshoot packages that fix one security issue are now available for Red Hat Enterprise Linux 5, 6, and 7. Red Hat Product Security has rated this update as having Important security [More...]

Red Hat: 2015:0728-01: ipa and slapi-nis: Moderate Advisory (Mar 26)

Updated ipa and slapi-nis packages that fix two security issues and several bugs are now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having Moderate security [More...]

Red Hat: 2015:0727-01: kernel-rt: Important Advisory (Mar 26)

Updated kernel-rt packages that fix two security issues and several bugs are now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having Important security [More...]

Red Hat: 2015:0726-01: kernel: Important Advisory (Mar 26)

Updated kernel packages that fix two security issues and several bugs are now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having Important security [More...]

Red Hat: 2015:0718-01: firefox: Critical Advisory (Mar 24)

Updated firefox packages that fix two security issues are now available for Red Hat Enterprise Linux 5, 6, and 7. Red Hat Product Security has rated this update as having Critical security [More...]

Red Hat: 2015:0707-01: qpid: Moderate Advisory (Mar 19)

Updated qpid packages that fix multiple security issues and one bug are now available for Red Hat Enterprise MRG 3 for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having Moderate security [More...]

Red Hat: 2015:0708-01: qpid: Moderate Advisory (Mar 19)

Updated qpid packages that fix multiple security issues and one bug are now available for Red Hat Enterprise MRG 3 for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having Moderate security [More...]


Ubuntu: 2549-1: libarchive vulnerabilities (Mar 25)

libarchive could be made to crash or overwrite files.

Ubuntu: 2548-1: Batik vulnerability (Mar 25)

Batik could be made to consume resources or expose sensitive information.

Ubuntu: 2547-1: Mono vulnerabilities (Mar 24)

Several security issues were fixed in Mono.

Ubuntu: 2544-1: Linux kernel vulnerabilities (Mar 24)

Several security issues were fixed in the kernel.

Ubuntu: 2541-1: Linux kernel vulnerabilities (Mar 24)

Several security issues were fixed in the kernel.

Ubuntu: 2543-1: Linux kernel (Trusty HWE) vulnerabilities (Mar 24)

Several security issues were fixed in the kernel.

Ubuntu: 2545-1: Linux kernel (Utopic HWE) vulnerabilities (Mar 24)

Several security issues were fixed in the kernel.

Ubuntu: 2542-1: Linux kernel (OMAP4) vulnerabilities (Mar 24)

Several security issues were fixed in the kernel.

Ubuntu: 2546-1: Linux kernel vulnerabilities (Mar 24)

Several security issues were fixed in the kernel.

Ubuntu: 2539-1: Django vulnerabilities (Mar 23)

Several security issues were fixed in Django.

Ubuntu: 2540-1: GnuTLS vulnerabilities (Mar 23)

Several security issues were fixed in GnuTLS.

Ubuntu: 2538-1: Firefox vulnerabilities (Mar 22)

Firefox could be made to crash or run programs as your login if itopened a malicious website.

Ubuntu: 2537-1: OpenSSL vulnerabilities (Mar 19)

Several security issues were fixed in OpenSSL.

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.