Frugalware Security Announcements (FSAs)

This is a list of security announcments that have been released for the current stable version of Frugalware

avahi avahi-compat avahi-glib avahi-gtk2 avahi-python avahi-qt3 avahi-sharp

  • Author: voroskoi
  • Vulnerable: 0.6.13-1
  • Unaffected: 0.6.13-2siwenna1

A vulnerability has been reported in Avahi, which can be exploited by malicious, local users to bypass certain security restrictions. The vulnerability is caused due to Avahi failing to validate the source of netlink messages. This can be exploited to trick Avahi into reacting to fake network changes.

CVEs:

kernel

  • Author: voroskoi
  • Vulnerable: 2.6.17-6siwenna2
  • Unaffected: 2.6.17-6siwenna3

By setting the system time to the end of unixtime, it is possible to reset the system time to the lowest possible integer of unixtime. When the systemclock reaches “Tue Jan 19 03:14:08 UTC 2038”, the 32-bit signed integer containing the time will overflow and the system time will be reset to “Fri Dec 13 20:45:52 UTC 1901”. This is known as the Year 2038 Problem.

libpng

  • Author: voroskoi
  • Vulnerable: 1.2.12-4
  • Unaffected: 1.2.13-1siwenna1

Tavis Ormandy has reported a vulnerability in libpng, which can be exploited by malicious people to cause a DoS (Denial of Service). The vulnerability is caused due to an out-of-bounds read error in the “png_set_sPLT()” function in pngset.c. This can be exploited by tricking an application using the library to process a specially crafted PNG file.

CVEs:

openldap

  • Author: voroskoi
  • Vulnerable: 2.3.27-1
  • Unaffected: 2.3.29-1siwenna1

Evgeny Legerov has reported a vulnerability in OpenLDAP, which can be exploited by malicious people to cause a DoS (Denial of Service). The vulnerability is caused due to an error when processing certain BIND requests. This can be exploited to cause a crash by sending specially crafted BIND requests to an OpenLDAP server.

CVEs:

pdns-recursor

  • Author: voroskoi
  • Vulnerable: 3.1.2-1
  • Unaffected: 3.1.4-1siwenna1

Two vulnerabilities have been reported in PowerDNS Recursor, which can be exploited by malicious people to cause a DoS (Denial of Service) and potentially compromise a vulnerable system.

  1. An error in length calculation when handling TCP DNS queries can be exploited to cause an overly large copy via a specially crafted packet. Successful exploitation may allow execution of arbitrary code.
  2. An error in the handling CNAME records can be exploited to crash the service.

CVEs:

phpmyadmin

  • Author: voroskoi
  • Vulnerable: 2.9.1_rc1-1siwenna1
  • Unaffected: 2.9.1.1-1siwenna1

Input containing UTF-7 encoded characters passed to the script which displays error messages is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user’s browser session in context of an affected site. Three other security issues fixed too, see http://www.phpmyadmin.net/home_page/security.php?issue=PMASA-2006-{7,8,9} for details.

CVEs:

openssh

  • Author: voroskoi
  • Vulnerable: 4.4p1-1siwenna1
  • Unaffected: 4.5p1-1siwenna1

A weakness has been reported in OpenSSH, which can be exploited by malicious people to bypass certain security restrictions. The weakness is caused due to an error within the privilege separation monitor, which may weaken the authentication process. Reportedly, the weakness can only be exploited in combination with other vulnerabilities.

CVEs:

imlib2

  • Author: voroskoi
  • Vulnerable: 1.2.2-1
  • Unaffected: 1.2.2-2siwenna1

Some vulnerabilities have been reported in imlib2, which can be exploited by malicious people to cause a DoS (Denial of Service) or potentially compromise an application using the library. The vulnerabilities are caused due to unspecified errors within the processing of JPG, ARGB, PNG, LBM, PNM, TIFF, and TGA images. This may be exploited to execute arbitrary code by e.g. tricking a user into opening a specially crafted image file with an application using imlib2.