Book Mark

Ike.ninja

Linux Fun
  • Home
  • How to
  • Reference Links
  • Categories
    • Releases
    • Plesk
    • Community
    • CMS
    • security
    • MYSQL
    • cPanel
  • Tools
    • IP Checker
    • Byte Converter
RSS

Debian: 2715-1: puppet: code execution

Jun27
by Ike on June 27, 2013 at 6:41 pm
Posted In: Other

(Jun 26) It was discovered that puppet, a centralized configuration management system, did not correctly handle YAML payloads. A remote attacker could use a specially-crafted payload to execute arbitrary code on the puppet master. [More…]

└ Tags: code, YAML
 Comment 

Debian: 2716-1: iceweasel: Multiple vulnerabilities

Jun27
by Ike on June 27, 2013 at 6:38 pm
Posted In: Other

(Jun 26) Multiple security issues have been found in Iceweasel, Debian’s version of the Mozilla Firefox web browser: Multiple memory safety errors, use-after-free vulnerabilities, missing permission checks, incorrect memory handling and other implementaton errors may lead to the execution [More…]

└ Tags: free, Mozilla Firefox
 Comment 

Ubuntu: 1891-1: Thunderbird vulnerabilities

Jun27
by Ike on June 27, 2013 at 5:44 pm
Posted In: Other

(Jun 26) Several security issues were fixed in Thunderbird.

 Comment 

Red Hat: 2013:0983-01: curl: Moderate Advisory

Jun27
by Ike on June 27, 2013 at 5:44 pm
Posted In: Other

(Jun 25) Updated curl packages that fix one security issue are now available for Red Hat Enterprise Linux 5 and 6. The Red Hat Security Response Team has rated this update as having moderate [More…]

└ Tags: Moderate Advisory, Red Hat, security, update
 Comment 

cPanel Security Disclosure: TSR-2013-0007

Jun27
by Ike on June 27, 2013 at 8:05 am
Posted In: Community, cPanel, Hosting, News, security

Important: cPanel Security Disclosure TSR-2013-0007

The following disclosure covers the Targeted Security Release 2013-06-26.
Each vulnerability is assigned an internal case number which is reflected below.

Information regarding the cPanel Security Level rankings can be found here:http://go.cpanel.net/securitylevels

Case 71193

Summary

Local cPanel users are able to take over ownership of any file or directory on the system.

Security Rating

cPanel has assigned a Security Level of Important to this vulnerability.

Description

The log processing subsystem, cpanellogd, on cPanel & WHM servers offers an option for users to create an archive of their domain’s access logs in their home directory. During the preparatory steps for archiving, Cpanel::Logs::prep_logs_path performs a variety of checks to ensure a proper operating environment exists. A number of these checks are performed by a root-privileged process on files and directories in a user’s home directory. A malicious user could take advantage of this behavior to take ownership of important files on the same file system as his home directory.

This issue was discovered by the cPanel Security Team.

Solution

This issue is resolved in the following builds:

* 11.38.1.4 and greater
* 11.38.0.19 and greater
* 11.36.1.9 and greater
* 11.34.1.17 and greater
* 11.32.6.8 and greater

Please update your cPanel & WHM system to one of the aforementioned versions or the latest public release available. A full listing of published versions can always be found at http://httpupdate.cpanel.net/.

Case 71109

Summary

Local cPanel users are able to take over ownership of any file or directory on the system.

Security Rating

cPanel has assigned a Security Level of Important to this vulnerability.

Description

The log processing subsystem, cpanellogd, on cPanel & WHM servers offers an option for users to create an archive of their domain’s access logs in their home directory. When cpanellogd creates these archives, some operations are performed by a root-privileged process in the user’s home directory. Through the use of a carefully crafted hard link a malicious user could take advantage of this behavior to take ownership of any file on the same file system as his home directory.

This issue was discovered by the cPanel Security Team.

Solution

This issue is resolved in the following builds:

* 11.38.1.4 and greater
* 11.38.0.19 and greater
* 11.36.1.9 and greater
* 11.34.1.17 and greater
* 11.32.6.8 and greater

Please update your cPanel & WHM system to one of the aforementioned versions or the latest public release available. A full listing of published versions can always be found at http://httpupdate.cpanel.net/.

For the PGP Signed Message, Please go here.

└ Tags: 11.38, directory, home, news, security, vulnerability
 Comment 
  • Page 2,622 of 2,967
  • « First
  • «
  • 2,620
  • 2,621
  • 2,622
  • 2,623
  • 2,624
  • »
  • Last »

What’s New?

  • Fedora 42: tinygltf Update 2.9.7 Advisory FEDORA-2025-ac8ed4a110
  • Fedora 43: webkitgtk Critical Update for CVE-2025-13947, 43458, 66287
  • Fedora 42: abrt Critical Command Injection Vulnerability CVE-2025-12744
  • Fedora 42: Chromium High CVE-2025-13630, 13631, 13632 Advisory
  • Ubuntu 22.04: Linux Kernel Azure Important Security Flaws USN-7910-2
  • Ubuntu 22.04: Important Linux Kernel Updates Addressing Security Flaws
  • Ubuntu 22.04 LTS: Linux Kernel Critical Security Vulnerability USN-7889-5
  • Ubuntu 25.10: Linux GCP Kernel Critical Security Issues USN-7906-2
  • Debian: Chromium Critical Exec Abuse DoS Info Disclosure DSA-6072-1
  • Debian: Unbound Critical Cache Poisoning Fix DSA-6071-1 CVE-2025-11411
  • Ubuntu 20.04 LTS: Important CUPS Denial of Service Advisory USN-7912-2
  • Ubuntu 25.10: MAME Critical Heap Overflow Attacks USN-7913-1
  • Fedora 42: usd Important Security Update for 3D Format 2025-073e4f7991
  • Ubuntu 23.04: xyz Enhanced Security Vulnerabilities Update 2025-4bd12a45g3
  • Debian: WebKitGTK Critical CVE-2025-43392 Exfiltration and Crash DSA-6070-1
  • Debian: OpenVPN Critical HMAC Flaw Bypass CVE-2025-13086 DSA-6069-1
  • State of the Word 2025: Innovation Shaped by Community
  • Ubuntu 20.04: Ghostscript Important DoS Vulnerability USN-7904-1
  • Ubuntu 25.10: PostgreSQL Critical Denial of Service Fix USN-7908-1
  • Fedora 41: openbao 2.4.4 Important Security Issues DoS 2025-45a7dd8f10
  • Fedora 41: restic 0.18.1 Advisory – Urgent Security Concerns Identified
  • Debian: Critical Denial of Service & Privilege Escalation DSA-6067-1
  • Debian 11: Xen Critical Privilege Escalation DSA-6068-1 CVE-2024-28956
  • WordPress 6.9 “Gene”
  • Ubuntu 25.10: Django Important SQL Exec DoS Vulnerabilities 2025:7903-1

Search

Translator

Tags

Business and industry code Community cPanel CVE Debian Debian Linux Distribution - Security Advisories Development Events Fedora Fedora Linux Distribution - Security Advisories General Hosting Important Advisory Linux Moderate Advisory Month in WordPress news Parallels Plesk Parallels Plesk Panel Performance PHP Plesk news and announcements Plesk Panel Podcast ProdDevSec Product and technology Products Project Release News Red Hat Red Hat Linux Distribution - Security Advisories Releases security Security Centre sensitive site Ubuntu Ubuntu Linux Distribution - Security Advisories update updates Various vulnerability Web Server Survey Wordpress wp-briefing

Posts

Helpful Links

  • Liquidweb.com
  • MYSQL Dev Documentation
  • Plugins
  • Source forge SED command
  • Themes
  • WordPress Documentation
  • You Tube
December 2025
M T W T F S S
« Nov    
1234567
891011121314
15161718192021
22232425262728
293031  
  • Google
  • Yahoo
  • Liquid Web
  • Storm
  • YouTube

©1999-2025 Ike.ninja | Powered by WordPress with Easel | Subscribe: RSS | Back to Top ↑

50 queries. 8.75 mb Memory usage. 0.309 seconds.