Frugalware Security Announcements (FSAs)

This is a list of security announcments that have been released for the current stable version of Frugalware

kdelibs

  • Vulnerable: 3.5.9-1
  • Unaffected: 3.5.9-2kalgan1

A vulnerability has been reported in KDE, which can be exploited by malicious, local users to cause a DoS (Denial of Service) or to potentially gain escalated privileges. The vulnerability is caused due to an error in the start_kdeinit script (installed setuid root by default). This can be exploited to send signals to privileged processes, cause a DoS, or potentially execute arbitrary code in the context of the target process.

kernel

  • Vulnerable: 2.6.24-4kalgan1
  • Unaffected: 2.6.24-4kalgan2

A vulnerability has been reported in the Linux kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service). The vulnerability is caused due to an error when preventing race conditions between “fcntl_setlk()” and “close()” calls on SMP systems. This can be exploited to trigger the improper, reordered access to the file descriptor table and the “file_lock” structure of an inode, between threads running on different CPUs.

thunderbird

  • Vulnerable: 2.0.0.12-1
  • Unaffected: 2.0.0.14-1kalgan1

Some vulnerabilities have been reported in Mozilla Thunderbird, which can be exploited by malicious people to bypass certain security restrictions, conduct cross-site scripting attacks, or potentially compromise a user’s system. For more information, see FSA407.

CVEs:

util-linux-ng

  • Vulnerable: 2.13.1-1
  • Unaffected: 2.13.1-2kalgan1

A weakness has been reported in util-linux-ng, which can be exploited by malicious people to manipulate certain data. The security issue is caused due to an error in login.c while logging login attempts. This can be exploited to inject e.g. an arbitrary address in the audit logs via a specially crafted username.

CVEs:

wordpress

  • Vulnerable: 2.3.3-2kalgan1
  • Unaffected: 2.5.1-1kalgan1

Two vulnerabilities have been reported in WordPress, which can be exploited by malicious people to conduct cross-site scripting attacks, bypass certain security restrictions, and to compromise a vulnerable system.

  1. A vulnerability is caused due to improper access restriction of the administration section. This can be exploited to bypass the authentication mechanism and gain administrative access by setting a specially crafted cookie. This can further be exploited to execute arbitrary PHP code. Successful exploitation of this vulnerability requires that registering new accounts is enabled. The vulnerability is reported in version 2.5.
  2. Input passed to an unspecified parameter is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user’s browser session in context of an affected site.

CVEs:

frugalwareutils

  • Vulnerable: 0.7.9-1
  • Unaffected: 0.7.9-2kalgan1

A vulnerability has been reported in frugalwareutils, which can potentially be exploited by malicious people to cause a DoS on a vulnerable system. The vulnerability is caused due to creating new files as root without checking the current value of umask. Successful exploitation may allow execution of arbitrary code.

CVEs:

  • There is no CVE for this issue.

kernel

  • Vulnerable: 2.6.24-3
  • Unaffected: 2.6.24-4kalgan1

A vulnerability has been reported in the Linux kernel, which can be exploited by malicious, local users to cause a DoS (Denial of Service) or to potentially gain escalated privileges. A race condition error exists in the dnotify subsystem between calls to “fcntl()” and “close()”. This can be exploited to cause a system crash or potentially gain root privileges.

CVEs:

vorbis-tools

  • Vulnerable: 1.1.1-3
  • Unaffected: 1.1.1-4kalgan1

A vulnerability has been reported in vorbis-tools, which can potentially be exploited by malicious people to compromise a vulnerable system. The vulnerability is caused due to the use of vulnerable libfishsound; an input validation error when processing Speex headers, which can be exploited via a specially crafted Speex stream containing a negative “modeID” field in the header. Successful exploitation may allow execution of arbitrary code.

CVEs:

xine-lib

  • Vulnerable: 1.1.11-1kalgan2
  • Unaffected: 1.1.11-1kalgan3

A vulnerability has been reported in xine-lib, which can potentially be exploited by malicious people to compromise a vulnerable system. The vulnerability is caused due to the use of vulnerable libfishsound; an input validation error when processing Speex headers, which can be exploited via a specially crafted Speex stream containing a negative “modeID” field in the header.

Successful exploitation may allow execution of arbitrary code.

CVEs:

xine-lib

  • Vulnerable: 1.1.11-1kalgan2
  • Unaffected: 1.1.11-1kalgan3

Guido Landi has discovered a vulnerability in xine-lib, which can be exploited by malicious people to compromise a user’s system. The vulnerability is caused due to a boundary error within the “demux_nsf_send_chunk()” function in src/demuxers/demux_nsf.c. This can be exploited to cause a stack-based buffer overflow via an overly long NSF title.

CVEs: