Mandriva Linux Security Advisory 2015-230 – Squid configured with client-first SSL-bump does not correctly validate X509 server certificate domain / hostname fields.
Monthly Archives: May 2015
Ubuntu Security Notice USN-2601-1
Ubuntu Security Notice 2601-1 – A race condition between chown() and execve() was discovered in the Linux kernel. A local attacker could exploit this race by using chown on a setuid-user-binary to gain administrative privileges.
Ubuntu Security Notice USN-2596-1
Ubuntu Security Notice 2596-1 – A race condition between chown() and execve() was discovered in the Linux kernel. A local attacker could exploit this race by using chown on a setuid-user-binary to gain administrative privileges.
Ubuntu Security Notice USN-2600-1
Ubuntu Security Notice 2600-1 – A race condition between chown() and execve() was discovered in the Linux kernel. A local attacker could exploit this race by using chown on a setuid-user-binary to gain administrative privileges.
Ubuntu Security Notice USN-2599-1
Ubuntu Security Notice 2599-1 – A race condition between chown() and execve() was discovered in the Linux kernel. A local attacker could exploit this race by using chown on a setuid-user-binary to gain administrative privileges.
Ubuntu Security Notice USN-2598-1
Ubuntu Security Notice 2598-1 – A race condition between chown() and execve() was discovered in the Linux kernel. A local attacker could exploit this race by using chown on a setuid-user-binary to gain administrative privileges.
Mandriva Linux Security Advisory 2015-228
Mandriva Linux Security Advisory 2015-228 – It was found that libuv does not call setgoups before calling setuid/setgid. This may potentially allow an attacker to gain elevated privileges. The libuv library is bundled with nodejs, and a fixed version of libuv is included with nodejs as of version 0.10.37. The nodejs package has been updated to version 0.10.38 to fix this issue, as well as several other bugs.
Mandriva Linux Security Advisory 2015-229
Mandriva Linux Security Advisory 2015-229 – It was discovered that the snmp_pdu_parse() function could leave incompletely parsed varBind variables in the list of variables. A remote, unauthenticated attacker could exploit this flaw to cause a crash or, potentially, execute arbitrary code.