Frugalware Security Announcements (FSAs)

This is a list of security announcments that have been released for the current stable version of Frugalware

wesnoth

  • Author: voroskoi
  • Vulnerable: 1.2.6-1
  • Unaffected: 1.2.6-2terminus1

A vulnerability has been reported in Wesnoth, which can be exploited by malicious people to cause a DoS (Denial of Service). The vulnerability is caused due to an unspecified error in the processing of UTF-8 strings within the multiplayer engine . This can be exploited by malicious clients to crash a vulnerable Wesnoth client.

CVEs:

kdebase

  • Author: voroskoi
  • Vulnerable: 3.5.6-3terminus2
  • Unaffected: 3.5.6-3terminus3

A vulnerability has been reported in Konqueror, which can be exploited by malicious people to disclose potentially sensitive information. The vulnerability is caused due to an unspecified error within the interaction between Konqueror and the Adobe Flash Player plug-in, which may result in key presses being leaked to a Flash applet. This can be exploited to disclose potentially sensitive information.

CVEs:

python

  • Author: voroskoi
  • Vulnerable: 2.5-3terminus2
  • Unaffected: 2.5-3terminus3

Slythers Bro has discovered a security issue in the imageop module for Python, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system. The security issue is caused due to an integer overflow error within the “tovideo()” function and can be exploited to cause a heap-based buffer overflow when specially crafted parameters are passed to the function. Successful exploitation may allow execution of arbitrary code.

openssl

  • Author: voroskoi
  • Vulnerable: 0.9.8-6
  • Unaffected: 0.9.8-7terminus1

Some vulnerabilities have been reported in OpenSSL, which can be exploited by malicious people to cause a DoS (Denial of Service) and compromise a vulnerable system.

  1. This fixes a weakness, which can be exploited by malicious, local users to disclose sensitive information. The problem is caused due to an error in the RSA implementation and can be exploited to disclose private keys via side-channel attacks.
  2. Off-by-one error in the SSL_get_shared_ciphers function in OpenSSL 0.9.7l and 0.9.8d might allow remote attackers to execute arbitrary code via a crafted packet that triggers a one-byte buffer underflow. NOTE: this issue was introduced as a result of a fix for CVE-2006-3738.

CVEs:

xfs

  • Author: voroskoi
  • Vulnerable: 1.0.4-1
  • Unaffected: 1.0.4-2terminus1

Some vulnerabilities have been reported in the X.Org X11 X Font Server (XFS), which can be exploited by malicious, local users to gain escalated privileges.

  1. An integer overflow exists within the handlers for the X protocol requests “QueryXBitmaps” and “QueryXExtents”, which do not correctly check the “length” parameters before passing them to the “build_range()” function. This can be exploited to cause a heap-based buffer overflow by sending specially crafted “QueryXBitmaps” and “QueryXExtents” requests to a vulnerable service.
  2. An error exists within the handler for the X protocol requests “QueryXBitmaps” and “QueryXExtents” when calling the “swap_char2b()” function, which can be exploited to swap an arbitrary number of bytes on the heap, resulting in a heap corruption.

CVEs:

ruby

  • Author: voroskoi
  • Vulnerable: 1.8.5-4terminus1
  • Unaffected: 1.8.5-4terminus2

Chris Clark has reported a security issue in Ruby, which can be exploited by malicious people to conduct spoofing attacks. The security issue is caused due to the “Net::HTTPS” library not properly checking if the Common Name field provided inside SSL server certificates matches the requested hostname of a server. This can be exploited to conduct spoofing attacks. Successful exploitation requires a MitM (Man-in-the-Middle) attack and possession of a valid certificate, which is signed by the CA specified in the client.

t1lib

  • Author: voroskoi
  • Vulnerable: 5.1.1-1
  • Unaffected: 5.1.1-2terminus1

Hamid Ebadi has reported a vulnerability in t1lib, which can be exploited by malicious users to potentially compromise a vulnerable system. The vulnerability is caused due to a boundary error within the “intT1_EnvGetCompletePath()” function in lib/t1lib/t1env.c. This can be exploited to cause a buffer overflow when an application processes an overly long string in the “FileName” parameter.

CVEs:

elinks

  • Author: voroskoi
  • Vulnerable: 0.11.2-2terminus1
  • Unaffected: 0.11.2-2terminus2

A weakness has been reported in ELinks, which can be exploited by malicious people to disclose sensitive information. The content of POST requests sent to HTTPS webservers via a proxy is sent unencrypted via the CONNECT command to the configured proxy. This can be exploited to disclose the content of POST requests by e.g. sniffing network traffic.

CVEs:

firefox

  • Author: voroskoi
  • Vulnerable: 2.0.0.6-1terminus1
  • Unaffected: 2.0.0.7-1terminus1

Mozilla has acknowledged a security issue in Firefox, which potentially can be exploited by malicious people to compromise a user’s system. The security issue is caused due to the “-chrome” parameter allowing execution of arbitrary Javascript script code in chrome context. This can be exploited to execute arbitrary commands on a user’s system e.g. via applications invoking Firefox with unfiltered command line arguments.

CVEs:

inotify-tools

  • Author: voroskoi
  • Vulnerable: 3.8-1
  • Unaffected: 3.8-2terminus1

A vulnerability has been reported in inotify-tools, which can potentially be exploited by malicious users to compromise an application using the library. The vulnerability is caused due to a boundary error within the “inotifytools_snprintf()” function in src/inotifytools.c. This can be exploited to cause a buffer overflow by e.g. creating a file with an overly long filename in a specific directory. Successful exploitation may allow the execution of arbitrary code with privileges of the application using the affected library.