Frugalware Security Announcements (FSAs)

This is a list of security announcments that have been released for the current stable version of Frugalware

wireshark

  • Author: kikadf
  • Vulnerable: 1.8.6-1
  • Unaffected: 1.8.13-1arcturus1

Moshe Kaplan discovered that the NFS dissector could be crashed, resulting in denial of service. It was discovered that the RLC dissector could be crashed, resulting in denial of service. Wesley Neelen discovered a buffer overflow in the MPEG file parser, which could lead to the execution of arbitrary code.

CVEs:

gnutls

  • Author: kikadf
  • Vulnerable: 2.12.17-1
  • Unaffected: 2.12.17-2arcturus1

Nikos Mavrogiannopoulos of Red Hat discovered an X.509 certificate verification issue in GnuTLS, an SSL/TLS library. A certificate validation could be reported sucessfully even in cases were an error would prevent all verification steps to be performed. Suman Jana reported that GnuTLS, deviating from the documented behavior, considers a version 1 intermediate certificate as a CA certificate by default.

CVEs:

file

  • Author: kikadf
  • Vulnerable: 5.14-1
  • Unaffected: 5.14-2arcturus1

It was discovered that file, a file type classification tool, contains a flaw in the handling of “indirect” magic rules in the libmagic library, which leads to an infinite recursion when trying to determine the file type of certain files.

CVEs:

libtar

  • Author: kikadf
  • Vulnerable: 1.2.11-5
  • Unaffected: 1.2.20-1arcturus1

Timo Warns reported multiple integer overflow vulnerabilities in libtar, a library for manipulating tar archives, which can result in the execution of arbitrary code. A directory traversal attack was reported against libtar, a C library for manipulating tar archives. The application does not validate the filenames inside the tar archive, allowing to extract files in arbitrary path. An attacker can craft a tar file to override files beyond the tar_extract_glob and tar_extract_all prefix parameter.

libgadu

  • Author: kikadf
  • Vulnerable: 1.11.2-1
  • Unaffected: 1.11.2-2arcturus1

Yves Younan and Ryan Pentney discovered that libgadu, a library for accessing the Gadu-Gadu instant messaging service, contained an integer overflow leading to a buffer overflow. Attackers which impersonate the server could crash clients and potentially execute arbitrary code.

CVEs:

mumble

  • Author: kikadf
  • Vulnerable: 1.2.4-1
  • Unaffected: 1.2.4-2arcturus1

It was discovered that a malformed Opus voice packet sent to a Mumble client could trigger a NULL pointer dereference or an out-of-bounds array access. A malicious remote attacker could exploit this flaw to mount a denial of service attack against a mumble client by causing the application to crash. It was discovered that a malformed Opus voice packet sent to a Mumble client could trigger a heap-based buffer overflow. A malicious remote attacker could use this flaw to cause a client crash (denial of service) or potentially use it to execute arbitrary code.

perl

  • Author: kikadf
  • Vulnerable: 5.14.1-5
  • Unaffected: 5.14.1-6arcturus1

It was discovered that Perl’s Locale::Maketext module incorrectly handled backslashes and fully qualified method names. An attacker could possibly use this flaw to execute arbitrary code when an application used untrusted templates.

CVEs:

pidgin

  • Author: kikadf
  • Vulnerable: 2.10.7-1
  • Unaffected: 2.10.7-2arcturus2

Jaime Breva Ribes discovered that a remote XMPP user can trigger a crash by sending a message with a timestamp in the distant future. Pidgin could be crashed through overly wide tooltip windows. Jacob Appelbaum discovered that a malicious server or a “man in the middle” could send a malformed HTTP header resulting in denial of service. Daniel Atallah discovered that Pidgin could be crashed through malformed Yahoo! P2P messages. Fabian Yamaguchi and Christian Wressnegger discovered that Pidgin could be crashed through malformed MSN messages. Fabian Yamaguchi and Christian Wressnegger discovered that Pidgin could be crashed through malformed XMPP messages. It was discovered that incorrect error handling when reading the response from a STUN server could result in a crash. Matt Jones discovered a buffer overflow in the parsing of malformed HTTP responses. Yves Younan and Ryan Pentney discovered a buffer overflow when parsing Gadu-Gadu messages. Yves Younan and Pawel Janic discovered an integer overflow when parsing MXit emoticons. Yves Younan discovered a buffer overflow when parsing SIMPLE headers. Daniel Atallah discovered that Pidgin could be crashed via malformed IRC arguments.

drupal6

  • Author: kikadf
  • Vulnerable: 6.28-1
  • Unaffected: 6.30-1arcturus1

Multiple vulnerabilities have been discovered in Drupal, a fully-featured content management framework: Cross-site request forgery, insecure pseudo random number generation, code execution, incorrect security token validation and cross-site scripting. Christian Mainka and Vladislav Mladenov reported a vulnerability in the OpenID module that allows a malicious user to log in as other users on the site, including administrators, and hijack their accounts.

CVEs:

drupal7

  • Author: kikadf
  • Vulnerable: 7.22-1
  • Unaffected: 7.22-2arcturus1

Multiple vulnerabilities have been discovered in Drupal, a fully-featured content management framework: Cross-site request forgery, insecure pseudo random number generation, code execution, incorrect security token validation and cross-site scripting. Christian Mainka and Vladislav Mladenov reported a vulnerability in the OpenID module that allows a malicious user to log in as other users on the site, including administrators, and hijack their accounts. Matt Vance and Damien Tournoud reported an access bypass vulnerability in the taxonomy module. Under certain circumstances, unpublished content can appear on listing pages provided by the taxonomy module and will be visible to users who should not have permission to see it.