http://secunia.com/advisories/28835/ - A bug in the vmsplice() call in the Linux kernel can allow a local user to escalate privileges to root. Sample code is available and has been verified as working. This bug affects kernel version 2.6.17 - 220.127.116.11, although the privilege escalation only works in the extended version of vmsplice() in 2.6.23 - 2.6.24. A patch partially fixing the bug is available in 18.104.22.168.
http://us1.samba.org/samba/security/CVE-2007-6015.html - (CVE-2007-6015) A vulnerability in Samba 3.0.0 through 3.0.27a allows for remote code execution. This only affects samba shares setup using the domain logons configuration option. Disabling this option, or upgrading to 3.0.28 will remove this vulnerability.
http://docs.info.apple.com/article.html?artnum=307004 - The Block all incoming connections setting for the Application Firewall allows any process running as user root (UID 0) to receive incoming connections, and also allows mDNSResponder to receive connections. This could result in the unexpected exposure of network services, as the original description is misleading. Please take this into account when locking down your OS 10.5 system.
http://research.eeye.com/html/alerts/zeroday/20070812.html - There exists a heap overflow in Yahoo Messenger 22.214.171.1243. It allows for remote code execution for users who accept a webcam invite from a malicious source. A patch is currently not available; please verify the person with whom you are chatting before accepting webcam invites.
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3387 - gpdf is used in various programs including (1) poppler, (2) xpdf, (3) kpdf, (4) kdegraphics, (5) CUPS and (6) tetex, and others. This vulnerability is in gpdf prior to version 2.8.2. Please check with your OS provider for updates of any programs with the ability to read PDFs.
http://research.eeye.com/html/alerts/zeroday/20070606.html - ActiveX controls used with Yahoo! Webcam image upload and view utilities could lead to remote compromise of client machines. Yahoo! has released a patch, link available at the above location.
http://secunia.com/advisories/25183/ - Four specific vulnerabilities allow for exploits on both clients and the server in the range of Denial of Service (DoS) to running arbitrary code. This affects Exchange 2000 Enterprise Server, Exchange 2000, 2003 and 2007. Patches are available for each of these systems and links are provided at the URL above.
http://www.securityfocus.com/bid/23447/info - It appears that a bounds checking error in the IPV4 forwarding semantics stack could lead to a remote Denial of Service (DoS) or possibly malicious code execution. This has been fixed in 2.6.21-rc6. RedHat has released updates for RHEL5.