Wed Jun 26 12:26:20 PDT 2002
patches/packages/openssh.tgz: Upgraded to openssh-3.4p1.
This version enables privilege separation by default. The README.privsep file
says this about it:
Privilege separation, or privsep, is method in OpenSSH by which operations
that require root privilege are performed by a separate privileged monitor
process. Its purpose is to prevent privilege escalation by containing
corruption to an unprivileged process. More information is available at:
http://www.citi.umich.edu/u/provos/ssh/privsep.html
Note that ISS has released an advisory on OpenSSH (OpenSSH Remote Challenge
Vulnerability). Slackware is not affected by this issue, as we have never
included AUTH_BSD, S/KEY, or PAM. Unless at least one of these options is
compiled into sshd, it is not vulnerable. Further note that none of these
options are turned on in a default build from source code, so if you have
built sshd yourself you should not be vulnerable unless you've enabled one
of these options.
Regardless, the security provided by privsep is unquestionably better.
This time we (Slackware) were lucky, but next time we might not be.
Therefore we recommend that all sites running the OpenSSH daemon upgrade to
this new openssh package. After upgrading the package, restart the daemon
like this:
/etc/rc.d/rc.sshd restart
We would like to thank Theo and the rest of the OpenSSH team for
their quick handling of this issue, Niels Provos and Markus Friedl for
implementing privsep, and Solar Designer for working out issues with
privsep on 2.2 Linux kernels.
----------------------------
Sat Jun 22 12:16:12 PDT 2002
libsafe.tgz: Added libsafe, a library that intercepts and prevents buffer
overflow attacks such as the Apache chunking issue. If you are
continuing to run a Slackware 7.1 machine that is exposed to the
Internet, you would be well advised to install this.
------------------------------
Thu Apr 25 12:00:50 PDT 2002
patches/packages/sudo.tgz: Upgraded to sudo-1.6.6.
This version of sudo fixes a security problem whereby a local user may gain
root access through corruption of the heap (Off-By-Five).
This issue was discovered by Global InterSec LLC, and more information may
be found on their web site:
http://www.globalintersec.com/adv/sudo-2002041701.txt
The discussion on the site indicates that this problem may only be exploitable
on systems that use PAM, which Slackware does not use. However, in the
absence of proof, it still seems prudent to upgrade sudo immediately.
(* Security fix *)
----------------------------
Wed Mar 13 11:56:05 PST 2002
patches/packages/cvs.tgz: Fix dir perms: chmod 755 /usr/share/cvs/contrib/.
patches/packages/rsync.tgz: Upgraded to rsync-2.5.4 (fixes broken -z option).
----------------------------
Tue Mar 12 00:12:57 PST 2002
patches/packages/cvs.tgz: Gzipped the tmp diff so that it applies correctly.
Thanks to George Georgakis for pointing out the mistake.
(* Security fix *)
----------------------------
Mon Mar 11 18:05:52 PST 2002
patches/packages/cvs.tgz: Patched to link to the shared zlib on the system
instead of statically linking to the included zlib source. Also, use mktemp
to create files in /tmp files more safely.
(* Security fix *)
----------------------------
Mon Mar 11 15:09:26 PST 2002
patches/packages/rsync.tgz: Upgraded to rsync-2.5.3. This fixes two security
problems:
* Make sure that supplementary groups are removed from a server
process after changing uid and gid. (Ethan Benson) (Debian bug
#132272, CVE CAN-2002-0080)
* Fix zlib double-free bug. (Owen Taylor, Mark J Cox) (CVE CAN-2002-0059)
(* Security fix *)
----------------------------
Mon Mar 11 13:38:37 PST 2002
patches/packages/zlib.tgz: Upgraded to zlib-1.1.4. This fixes a security
problem which may introduce vulnerabilities into any program that links with
zlib. Quoting the advisory on zlib.org:
"Depending upon how and where the zlib routines are called from the given
program, the resulting vulnerability may have one or more of the following
impacts: denial of service, information leakage, or execution of arbitrary
code."
Sites are urged to upgrade the zlib package immediately.
The complete advisory may be found here:
http://www.zlib.org/advisory-2002-03-11.txt
(* Security fix *)
----------------------------
Mon Mar 11 10:57:50 PST 2002
patches/packages/openssh.tgz: Upgraded to openssh-3.1p1. When preparing the
update on Saturday evening, I neglected to copy the new openssh.tgz package
out of the source directory and into the packages directory. If you
downloaded it since then, check to see if you have a /usr/doc/openssh-3.1p1/
directory -- if not, you'll need to grab the new package and install it.
Sorry about that...
----------------------------
Sat Mar 9 19:38:19 PST 2002
patches/packages/openssh.tgz: Upgraded to openssh-3.1p1.
This fixes a security problem in the openssh package. All sites running
OpenSSH should upgrade immediately.
All versions of OpenSSH between 2.0 and 3.0.2 contain an off-by-one error
in the channel code. OpenSSH 3.1 and later are not affected. This bug can
be exploited locally by an authenticated user logging into a vulnerable
OpenSSH server or by a malicious SSH server attacking a vulnerable OpenSSH
client. This bug was discovered by Joost Pol <
[email protected]>
(* Security fix *)
----------------------------
Fri Jan 25 14:25:51 PST 2002
patches/packages/rsync.tgz: Fixed a security hole by upgrading to
rsync-2.4.8pre1. This is the relevant information from the rsync NEWS file:
SECURITY FIXES:
* Signedness security patch from Sebastian Krahmer
<
[email protected]> -- in some cases we were not sufficiently
careful about reading integers from the network.
(* Security fix *)
----------------------------
Tue Jan 15 15:04:14 PST 2002
packages/glibc.tgz, glibcso.tgz: Patched glibc-2.1.3.
Fixed a buffer overflow in the glob(3) function. This bug may be
exploited through external services that might make use of it, like the
port of OpenBSD's FTP server (not included in Slackware, but an example
that's known to be affected). It's highly recommended that internet-
connected machines or machines with local users who might try to exploit
setuid root binaries be upgraded as soon as possible.
Added glibc-crypt-2.1.
(* Security fix *)
packages/openssh.tgz: Added openssh-3.0.2p1.
packages/openssl.tgz: Added openssl-0.9.6c.
packages/ossllibs.tgz: Added openssl-0.9.6c shared libraries.
----------------------------
Sun Dec 9 13:21:41 PST 2001
packages/wuftpd.tgz: This package overwrites the wu-ftpd-2.6.1 installed
by Slackware 7.1 (which has a nasty security hole), with wu-ftpd-2.6.2,
recently released to fix the problem. But for how long?
Don't install this package -- install the one below.
packages/proftpd.tgz: This is proftpd-1.2.4. Slackware switched to
proftpd because of repeated security problems with wu-ftpd. You can too. :)
(* Security fix *)
----------------------------
Sun Aug 26 16:06:55 PDT 2001
An input validation error in sendmail has been discovered by Cade Cairns of
SecurityFocus. This problem can be exploited by local users to gain root
access. It is not exploitable by remote attackers without shell access.
It is recommended that all multiuser sites running sendmail upgrade to these
new packages:
packages/procmail.tgz: Upgraded to procmail-3.21. The ChangeLog mentions
these problems, but it's not known how serious they really are:
- SECURITY: don't do unsafe things from signal handlers:
- ignore TRAP when terminating because of a signal
- resolve the host and protocol of COMSAT when it is set
- save the absolute path form of $LASTFOLDER for the comsat
message when it is set
- only use the log buffer if it's safe
packages/sendmail.tgz: Upgraded to sendmail.8.11.6. Removed setup for MAPS,
since it's no longer a free service.
packages/smailcfg.tgz: Upgraded to sendmail.8.11.6 config files.
Detailed information about this security problem may be found here:
http://www.securityfocus.com/bid/3163
(* Security fix *)
----------------------------
Thu Aug 9 20:56:55 PDT 2001
An advisory from zen-parse on BugTraq today describes a hole in the netkit-0.17
telnetd daemon which is used in Slackware. All sites running telnet service are
advised to upgrade using one of these updated packages as soon as possible.
packages/tcpip1.tgz: New version of the tcpip1 package containing a
fixed /usr/sbin/in.telnetd.
packages/telnetd.tgz: A patch-package containing just the fixed
in.telnetd binary (for faster download).
(* Security fix *)
----------------------------
Wed May 16 12:36:56 PDT 2001
packages/samba.tgz: Upgraded to samba-2.0.9. This is a bug fix
release that fixes the security problem that samba-2.0.8 meant
to address.
----------------------------
Mon Apr 23 23:39:07 PDT 2001
packages/samba.tgz: Upgraded to samba-2.0.8. Earlier versions have
a temp file handling problem that could allow a local attacker to
write to arbitrary devices, possibly destroying data.
----------------------------
Sun Apr 8 12:37:44 PDT 2001
packages/xntp.tgz: Patched xntp3-5.93e against recently reported buffer
overflow problem. All sites running xntp from Slackware 7.1 should
either upgrade to this package or ensure that their /etc/ntp.conf does
not allow connections from untrusted hosts. To deny people access to
your time daemon (not a bad idea anyway if you're only running ntp to
keep your own clock updated) use this in /etc/ntp.conf:
# Don't serve time or stats to anyone else
restrict default ignore
----------------------------
Sat Mar 10 19:58:47 PST 2001
packages/gmc.tgz, mc.tgz: Upgraded to mc-4.5.51, patched to prevent
input validation error on directory names. More information can be found
here:
http://www.securityfocus.com/vdb/?id=2016
Security Focus states, "Currently the SecurityFocus staff are not aware
of any exploits for this issue."
----------------------------
Mon Feb 26 22:30:38 PST 2001
packages/imapd.tgz: Upgraded to IMAP4rev1 2000.287 from pine4.33.
A remote exploit exists for the previously included version
of imapd, so all sites running imapd are urged to upgrade
to the new version immediately.
packages/pine.tgz: Upgraded to pine4.33.
----------------------------
Sat Feb 24 23:05:03 PST 2001
packages/sudo.tgz: Upgraded to sudo-1.6.3p6.
----------------------------
Sun Jan 28 17:43:29 PST 2001
packages/bind.tgz: Upgraded to bind-8.2.3.
----------------------------
Mon Nov 20 22:59:00 PST 2000
packages/ncurses.tgz: Upgraded to ncurses-5.2.
----------------------------
Fri Nov 10 20:24:04 PST 2000
packages/bind.tgz: Upgraded to bind-8.2.2-P7.
A bug in code intended to provide support for the transfer of compressed
zone files can crash the name server, resulting in denial of service.
More BIND security information can be found at:
http://www.isc.org/products/BIND/bind8.html
----------------------------
Wed Nov 1 12:35:58 PST 2000
packages/imapd.tgz: Upgraded to IMAP4rev1 2000.283 from pine-4.30.
packages/pine.tgz: Upgraded to pine-4.30.
Pine (versions 4.21 and before) contain a buffer overflow vulnerability
which allows a remote user to execute arbitrary code on the local client
by the sending of a special-crafted email message. The overflow occurs
during the periodic "new mail" checking of an open folder.
----------------------------
Mon Oct 23 14:09:22 PDT 2000
packages/xlock.tgz: Upgraded to xlockmore-4.17.2.
By providing a carefully crafted display variable to xlock, it is
possible for a local attacker to gain root access. Anyone running
xlock on a public machine should upgrade to this version of xlock
(or disable xlock) immediately.
----------------------------
Fri Oct 20 18:55:01 PDT 2000
packages/ppp.tgz: Fixed stupid /tmp bug in ppp-off. This could allow a
local user to corrupt system files.
----------------------------
Sat Oct 14 20:03:51 PDT 2000
packages/apache.tgz: Upgraded to apache_1.3.14.
It is recommended that sites using Apache upgrade to this
version of the apache package as soon as possible.
The following security problems are fixed with this version
of Apache (from the Apache announcement):
* A problem with the Rewrite module, mod_rewrite, allowed
access to any file on the web server under certain
circumstances
* The handling of Host: headers in mass virtual hosting
configurations, mod_vhost_alias, could allow access to
any file on the server
* If a cgi-bin directory is under the document root, the
source to the scripts inside it could be sent if using
mass virtual hosting
----------------------------
Thu Sep 28 19:45:07 PDT 2000
packages/tcpip1.tgz: Upgraded to wu-ftpd-2.6.1.
This fixes a possible format string hole reported on BugTraq.
----------------------------
Mon Sep 18 11:13:56 PDT 2000
packages/sysklogd.tgz: Upgraded to sysklogd-1.4. This fixes the
"klogd format bug" announced this morning on BugTraq.
----------------------------
Tue Sep 12 20:12:08 PDT 2000
packages/xchat.tgz: Upgraded to xchat-1.5.7.
This fixes the "X-Chat Command Execution Via URLs Vulnerability"
described on BugTraq.
A console version of X-Chat (xchat-text) has also been added to
this updated package.
----------------------------
Mon Sep 4 22:48:59 PDT 2000
This update fixes the three known locale-related vulnerabilities in glibc-2.1.3
recently reported on BugTraq that allow local users to gain root access. Thanks
to Solar Designer for putting together a set of patches from the current glibc
CVS version.
packages/glibcso.tgz: Recompiled with security patch for glibc-2.1.3.
packages/glibc.tgz: Recompiled with security patch for glibc-2.1.3.
packages/descrypt.tgz: Recompiled with security patch for glibc-2.1.3.
Note that if you don't reinstall this package after installing glibcso.tgz
and/or glibc.tgz, the C library will be limited to using MD5 crypt().
----------------------------
Sat Sep 2 01:26:24 PDT 2000
packages/perl.tgz: Patched suidperl to report hack attempts through syslog,
not /bin/mail. This patch closes a security hole through which local
users can gain root access using /usr/bin/suidperl5.6.0.