Greetings,
I am still trying to feel out where things are to be posted. I hope this forum is ok for this question.
I was reading on the O'Reilly Linux DevCenter site about software problems.
http://www.linuxdevcenter.com/pub/a/linux/2004/02/11/insecurities.html
On my system, I have libtool 1.4.3 installed. According to the link provided, the alert for libtool says:
Is this something we upgrade ourselves or is it tied into DA updates?
Does anyone know or experienced anything like this?
thanks!
I am still trying to feel out where things are to be posted. I hope this forum is ok for this question.
I was reading on the O'Reilly Linux DevCenter site about software problems.
http://www.linuxdevcenter.com/pub/a/linux/2004/02/11/insecurities.html
On my system, I have libtool 1.4.3 installed. According to the link provided, the alert for libtool says:
GNU libtool is a set of scripts used to create shared libraries from object files. The script ltmain.sh is vulnerable to a temporary file symbolic-link race condition that can be exploited by a local attacker to overwrite arbitrary files on the system with the permissions of the user running libtool.
It is recommended that all developers and other users of libtool upgrade to version 1.5.2 or newer as soon as possible.
Is this something we upgrade ourselves or is it tied into DA updates?
Does anyone know or experienced anything like this?
It has been reported that, under some conditions, PHP can leak the contents of variables from one virtual host to another virtual host on the same machine. According to the report, one of the conditions is that the variable register_globals = on must be set in the system php.ini file and that some virtual hosts have register_globals = off in their .htaccess configuration file.
Affected users should watch their vendors for an updated version of PHP. It is also suggested that for systems with virtual hosts register_globals be set to off in the system php.ini file unless there is a known reason to have it set to on.
thanks!