Ubuntu Security Notice 1931-1 - Chanam Park reported a Null pointer flaw in the Linux kernel's Ceph client. A remote attacker could exploit this flaw to cause a denial of service (system crash). An information leak was discovered in the Linux kernel's fanotify interface. A local user could exploit this flaw to obtain sensitive information from kernel memory. Jonathan Salwan discovered an information leak in the Linux kernel's cdrom driver. A local user can exploit this leak to obtain sensitive information from kernel memory if the CD-ROM drive is malfunctioning. Various other issues were also addressed.
ff0f4ce4c92fb685f81150d2928d46bd35bd6fe80f01c3cafaf05ff55984bc9c
Ubuntu Security Notice 1930-1 - An information leak was discovered in the Linux kernel's fanotify interface. A local user could exploit this flaw to obtain sensitive information from kernel memory. Kees Cook discovered a format string vulnerability in the Broadcom B43 wireless driver for the Linux kernel. A local user could exploit this flaw to gain administrative privileges.
ec507ea9ea853153cd28a169162de963684dc180b1645060dba3b01e0157ee9d
Ubuntu Security Notice 1929-1 - An information leak was discovered in the Linux kernel's fanotify interface. A local user could exploit this flaw to obtain sensitive information from kernel memory.
f68d1c7aacee636099b6e1fe830276fefcb8047d9fe218fb497bb2384cd84ef4
Ubuntu Security Notice 1932-1 - Chanam Park reported a Null pointer flaw in the Linux kernel's Ceph client. A remote attacker could exploit this flaw to cause a denial of service (system crash). An information leak was discovered in the Linux kernel's fanotify interface. A local user could exploit this flaw to obtain sensitive information from kernel memory. Jonathan Salwan discovered an information leak in the Linux kernel's cdrom driver. A local user can exploit this leak to obtain sensitive information from kernel memory if the CD-ROM drive is malfunctioning. Various other issues were also addressed.
ab1fa9388a03d31905b735951c22b32a508003bc66fc3019e4db4c7a72277ae1
Ubuntu Security Notice 1934-1 - Chanam Park reported a Null pointer flaw in the Linux kernel's Ceph client. A remote attacker could exploit this flaw to cause a denial of service (system crash). An information leak was discovered in the Linux kernel's fanotify interface. A local user could exploit this flaw to obtain sensitive information from kernel memory. Kees Cook discovered a format string vulnerability in the Linux kernel's disk block layer. A local user with administrator privileges could exploit this flaw to gain kernel privileges. Various other issues were also addressed.
59746e56eb4662747b4e9778ace867b2c146f9080c644e855f67b6b282da588b
Ubuntu Security Notice 1933-1 - Chanam Park reported a Null pointer flaw in the Linux kernel's Ceph client. A remote attacker could exploit this flaw to cause a denial of service (system crash). An information leak was discovered in the Linux kernel's fanotify interface. A local user could exploit this flaw to obtain sensitive information from kernel memory. Jonathan Salwan discovered an information leak in the Linux kernel's cdrom driver. A local user can exploit this leak to obtain sensitive information from kernel memory if the CD-ROM drive is malfunctioning. Various other issues were also addressed.
97f36fd7acbbdb408bc8a2410cb2e1addbcb7dfb4c5468466c4160ac45a04340
RSA Authentication Agent for PAM version 7.0.2 and prior relied on the PAM-enabled application to restrict the number of login attempts that may be made via the agent, rather than natively enforcing such restriction.. This may allow attackers to carry brute-force attacks against the vulnerable systems. RSA Authentication Agent for PAM 7.0.2.1 and 7.1 and later support Exponential Backoff feature that is designed to mitigate this vulnerability.
5d2b0b116fffb0415c9496b8b68a5ca4291750689707dd97470b6c058b7b9bde
HP Security Bulletin HPSBUX02922 SSRT101305 - Potential security vulnerabilities have been identified in Java5 Runtime Environment (JRE) and Java Developer Kit (JDK) running on HP-UX. These vulnerabilities could allow remote unauthorized access, disclosure of information, and other vulnerabilities. Revision 1 of this advisory.
504a83d618e734029acfad479193eb73a66f9c4a661b0b418602f9237d2461d7
Multiple buffer overflows and a race condition was discovered in NAS version 1.9.3
866ea28e7e05fc42b5631ecd238769cd8788d3b0860e5751d609a4bb5266da77
The BytePackedRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a signed integer overflow that allows bypassing of "dataBitOffset" boundary checks. This vulnerability allows for remote code execution. User interaction is required for this exploit in that the target must visit a malicious page or open a malicious file. This finding was purchased through the Packet Storm Bug Bounty program.
1b8625579128a6aa2eebdfe1d14a2d3ff5e447dbf25cd29275461b7cd5791be8
This bulletin summary lists two re-released Microsoft security bulletins for August, 2013.
7d0f4a6f9c9d7a3301042d79b6505d33cdbef0a2282b9eaca1e1b979375e4931
Red Hat Security Advisory 2013-1157-01 - Red Hat CloudForms Management Engine provides the insight, control, and automation needed to address the challenges of managing virtual environments. An input sanitization flaw was found in Red Hat CloudForms Management Engine. A user with administrative access to Red Hat CloudForms Management Engine could use this flaw to execute arbitrary Ruby code with root privileges. This issue was discovered by James Laska of Red Hat.
9107fa048862b41ccb4f7de6c918bae6bbf2532b169dde048d129919a6048a75
Debian Linux Security Advisory 2738-1 - Several vulnerabilities have been discovered in the interpreter for the Ruby language, which may lead to denial of service and other security problems.
5ee13cb1795d7a48b2912c75782eed27a5d04bc434a31b0a2a81f910b352d4a0
Open-Xchange AppSuite version 7.2.2 suffers from a race condition vulnerability.
29dc634c735488b15be5d3c5505557afe8bba7b4881bed94b6d11caad980cbda
Ubuntu Security Notice 1928-1 - It was discovered that Puppet incorrectly handled the resource_type service. A local attacker on the master could use this issue to execute arbitrary Ruby files. It was discovered that Puppet incorrectly handled permissions on the modules it installed. Modules could be installed with the permissions that existed when they were built, possibly exposing them to a local attacker. Various other issues were also addressed.
cdcde70f2713266a5b8a4ed92df915a902df42405d256a043c28743f4e1f6c7b
On various Linksys devices, an unspecified bug can cause an unsafe/undocumented TCP port to open allowing for unauthenticated remote access to the device.
498c65c860fe5d919123b02b7dda83e1dd02868d0b1adb1db402354c60007bd1
HP Security Bulletin HPSBMU02915 - A potential security vulnerability has been identified with HP Service Manager. The vulnerability could be exploited to allow remote unauthenticated access and elevation of privilege. Revision 1 of this advisory.
4aab2f4cbd7c2757d6b058eab56f90b8b510cfd70e2155b22d407190fbcdb86b
Drupal Password Policy third party module versions 6.x and 7.x suffer from a cross site scripting vulnerability.
c40e41a826657748ed02ee7f8067fcec7db89f9c774f0574fccd0d67621dd868
Drupal Entity API version 7.x suffers from an access bypass vulnerability.
306ad4a749d55e82431c05e5f483a030e0fea776244a2611db478fa23950bfec
Drupal BOTCHA Spam Prevention third party module version 7.x suffers from an information disclosure vulnerability.
e75e969fb138b8aa3836533eddc56d325b52dfa0dd6b756b49f028b37e2b0aa4
BIND is exposed to a new vulnerability which can be exploited remotely in order to derandomize the name server selection algorithm. Exploitation of this vulnerability can be used in conjunction with other off-path DNS cache poisoning exploits in order to make them more efficient. ISC has acknowledged the vulnerability and plans to address this deficiency by re-implementing the SRTT algorithm in future maintenance releases of the BIND 9 code. This whitepaper goes into great detail regarding this issue.
84356c82ef3047b3388b1711d4f92e2ade893d39556c93520d7e0953f3faf27f
Ubuntu Security Notice 1927-1 - Paul Collins discovered that libimobiledevice incorrectly handled temporary files. A local attacker could possibly use this issue to overwrite arbitrary files and access device keys. In the default Ubuntu installation, this issue should be mitigated by the Yama link restrictions.
f119bb9310e69655e310ff5fd8b5ab4e4715f2598b8ece8795beafcd0f842e7f
Ubuntu Security Notice 1926-1 - David Gibson discovered that SPICE incorrectly handled certain network errors. An attacker could use this issue to cause the SPICE server to crash, resulting in a denial of service.
cf1acb68ba0a829481703e54c3382683d9a83d1059212ebee71b20e35b60e212
This bulletin summary lists two re-released Microsoft security bulletins for August, 2013.
066f7e15f031a55988c403f8d1948b35ece80a4583eaab245bf5e9faa005da1f
The IntegerInterleavedRaster.verify() method in Oracle Java versions prior to 7u25 is vulnerable to a signed integer overflow that allows bypassing of "dataOffsets[0]" boundary checks. This vulnerability allows for remote code execution. User interaction is required for this exploit in that the target must visit a malicious page or open a malicious file. This finding was purchased through the Packet Storm Bug Bounty program.
c91966468587a351ac5a5ab7a6a5efec2d287d47df6ed6e6126cbf0ebccbe4b2