Rafael Rodrigues Obelheiro
1999-Dec-01 01:39 UTC
Security Patches for Slackware 7.0 Available (fwd)
---------- Forwarded message ---------- Date: Tue, 30 Nov 1999 12:14:09 -0800 (PST) From: David Cantrell <david@slackware.com> To: slackware-security@slackware.com Subject: Security Patches for Slackware 7.0 Available There are several security updates available for Slackware 7.0. We will always post bug fixes and security fixes to the /patches subdirectory on the ftp site: ftp.cdrom.com:/pub/linux/slackware-7.0/patches The ChangeLog.txt file in that directory will show what has been patched and why. Here is a short overview of the current patches available: ====================== BIND-8.2.2-P5 available ====================== CERT Advisory CA-99-14 Multiple Vulnerabilities in BIND: http://www.cert.org/advisories/CA-99-14-bind.html Six vulnerabilities have been found in BIND, the popular domain name server from the Internet Software Consortium (ISC). One of these vulnerabilities may allow remote intruders to gain priviledged access to name servers. It is recommended that all systems running the BIND package that shipped with Slackware 7.0 upgrade to this one. Here is the ChangeLog description: bind.tgz Upgraded to bind-8.2.2-P5. This fixes a vulnerability in the processing of NXT records that can be used in a DoS attack or (theoretically) be exploited to gain access to the server. It is suggested that everyone running bind upgrade to this package as soon as possible. ============================= nfs-server-2.2beta47 available ============================= It is recommended that all Slackware 7.0 systems using NFS upgrade to nfs-server 2.2beta47 to patch a possible exploit. Here is the ChangeLog description: nfs-server.tgz Upgraded to nfs-server-2.2beta47, to fix a security problem with the version that shipped with Slackware 7.0 (nfs-server-2.2beta46). By using a long pathname on a directory NFS mounted read-write, it may be possible for an attacker to execute arbitrary code on the server. It is recommended that everyone running an NFS server upgrade to this package immediately. These packages are designed to be installed on top of an existing Slackware 7.0 installation. In the case where a package already exists (such as bind.tgz), it is adviseable to use upgradepkg. For other fixes (such as the nfs-server.tgz one), you can just use installpkg to install the fix. NOTE: For packages that replace daemons on the system (such as bind), you need to make sure that you stop the daemon before installing the package. Otherwise the file may not be updated properly because it is in use. You can either stop the daemon manually or go into single user mode and then go back to multiuser mode. Example: # telinit 1 Go into single user mode # upgradepkg bind Perform the upgrade # telinit 3 Go back to multiuser mode Remember to back up configuration files before performing upgrades. - The Slackware Linux Project http://www.slackware.com From mail@mail.redhat.com Wed Dec 1 03:47:27 1999 Received: (qmail 29319 invoked from network); 1 Dec 1999 08:47:32 -0000 Received: from mail.redhat.com (199.183.24.239) by lists.redhat.com with SMTP; 1 Dec 1999 08:47:32 -0000 Received: from rosie.bitwizard.nl (root@13dyn215.delft.casema.net [212.64.76.215]) by mail.redhat.com (8.8.7/8.8.7) with ESMTP id DAA07065 for <linux-security@redhat.com>; Wed, 1 Dec 1999 03:47:27 -0500 Received: from cave.bitwizard.nl (root@cave.bitwizard.nl [192.168.234.1]) by rosie.bitwizard.nl (8.8.8/8.8.8) with ESMTP id JAA07546 for <linux-security@redhat.com>; Wed, 1 Dec 1999 09:47:25 +0100 Received: (from wolff@localhost) by cave.bitwizard.nl (8.9.3/8.9.3) id JAA00975 for linux-security@redhat.com; Wed, 1 Dec 1999 09:47:24 +0100 Approved: R.E.Wolff@BitWizard.nl Received: (qmail 8509 invoked by alias); 1 Dec 1999 01:42:33 -0000 Received: (qmail 8506 invoked from network); 1 Dec 1999 01:42:33 -0000 Received: from lists.redhat.com (199.183.24.247) by www.bitwizard.nl with SMTP; 1 Dec 1999 01:42:33 -0000 Received: (qmail 7135 invoked by uid 501); 1 Dec 1999 01:42:18 -0000 Received: (qmail 7115 invoked from network); 1 Dec 1999 01:42:18 -0000 Received: from mail.redhat.com (199.183.24.239) by lists.redhat.com with SMTP; 1 Dec 1999 01:42:18 -0000 Received: from vangogh.lcmi.ufsc.br (vangogh.lcmi.ufsc.br [150.162.14.111]) by mail.redhat.com (8.8.7/8.8.7) with ESMTP id UAA26084 for <linux-security@redhat.com>; Tue, 30 Nov 1999 20:42:15 -0500 Received: from jazz.lcmi.ufsc.br (root@200-215-21-151-as.acessonet.com.br [200.215.21.151]) by vangogh.lcmi.ufsc.br (8.8.8/8.8.8) with ESMTP id XAA28547; Tue, 30 Nov 1999 23:41:03 -0200 (EDT) (envelope-from obelix@lcmi.ufsc.br) Received: from localhost (obelix@localhost [127.0.0.1]) by jazz.lcmi.ufsc.br (8.9.3/8.9.3) with ESMTP id XAA00508; Tue, 30 Nov 1999 23:40:44 -0200 Date: Tue, 30 Nov 1999 23:40:44 -0200 (EDT) From: Rafael Rodrigues Obelheiro <obelix@lcmi.ufsc.br> To: linux-security@redhat.com, BUGTRAQ@securityfocus.com Subject: Security Fixes for Slackware 4.0 Available (fwd) Message-ID: <Pine.LNX.4.10.9911302340220.427-100000@jazz.lcmi.ufsc.br> MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII ---------- Forwarded message ---------- Date: Tue, 30 Nov 1999 12:13:36 -0800 (PST) From: David Cantrell <david@slackware.com> To: slackware-security@slackware.com Subject: Security Fixes for Slackware 4.0 Available There are several security updates available for Slackware 4.0. These patches should work on any libc5 Slackware system, but we have not tested them on each of the previous releases. We will always post bug fixes and security fixes to the /patches subdirectory on the ftp site: ftp.cdrom.com:/pub/linux/slackware-4.0/patches The ChangeLog.txt file in that directory will show what has been patched and why. Here is a short overview of the current patches available: ====================== BIND-8.2.2-P5 available ====================== CERT Advisory CA-99-14 Multiple Vulnerabilities in BIND: http://www.cert.org/advisories/CA-99-14-bind.html Six vulnerabilities have been found in BIND, the popular domain name server from the Internet Software Consortium (ISC). One of these vulnerabilities may allow remote intruders to gain priviledged access to name servers. It is recommended that all systems running the BIND package that shipped with Slackware 7.0 upgrade to this one. Here is the ChangeLog description: bind.tgz Upgraded to bind-8.2.2-P5. This fixes a vulnerability in the processing of NXT records that can be used in a DoS attack or (theoretically) be exploited to gain access to the server. It is suggested that everyone running bind upgrade to this package as soon as possible. ============================= nfs-server-2.2beta47 available ============================= It is recommended that all Slackware 4.0 systems using NFS upgrade to nfs-server 2.2beta47 to patch a possible exploit. Here is the ChangeLog description: nfs-server.tgz Upgraded to nfs-server-2.2beta47, to fix a security problem found in nfs-server-2.2beta46 and earlier. By using a long pathname on a directory NFS mounted read-write, it may be possible for an attacker to execute arbitrary code on the server. It is recommended that everyone running an NFS server upgrade to this package immediately. These packages are designed to be installed on top of an existing Slackware 4.0 installation. In the case where a package already exists (such as bind.tgz), it is adviseable to use upgradepkg. For other fixes (such as the nfs-server.tgz one), you can just use installpkg to install the fix. NOTE: For packages that replace daemons on the system (such as bind), you need to make sure that you stop the daemon before installing the package. Otherwise the file may not be updated properly because it is in use. You can either stop the daemon manually or go into single user mode and then go back to multiuser mode. Example: # telinit 1 Go into single user mode # upgradepkg bind Perform the upgrade # telinit 3 Go back to multiuser mode Remember to back up configuration files before performing upgrades. - The Slackware Linux Project http://www.slackware.com From mail@mail.redhat.com Wed Dec 1 03:47:32 1999 Received: (qmail 29453 invoked from network); 1 Dec 1999 08:47:34 -0000 Received: from mail.redhat.com (199.183.24.239) by lists.redhat.com with SMTP; 1 Dec 1999 08:47:34 -0000 Received: from rosie.bitwizard.nl (root@13dyn215.delft.casema.net [212.64.76.215]) by mail.redhat.com (8.8.7/8.8.7) with ESMTP id DAA07071 for <linux-security@redhat.com>; Wed, 1 Dec 1999 03:47:32 -0500 Received: from cave.bitwizard.nl (root@cave.bitwizard.nl [192.168.234.1]) by rosie.bitwizard.nl (8.8.8/8.8.8) with ESMTP id JAA07553 for <linux-security@redhat.com>; Wed, 1 Dec 1999 09:47:29 +0100 Received: (from wolff@localhost) by cave.bitwizard.nl (8.9.3/8.9.3) id JAA00991 for linux-security@redhat.com; Wed, 1 Dec 1999 09:47:28 +0100 Approved: R.E.Wolff@BitWizard.nl Received: (qmail 8256 invoked by alias); 1 Dec 1999 01:09:12 -0000 Received: (qmail 8253 invoked from network); 1 Dec 1999 01:09:11 -0000 Received: from lists.redhat.com (199.183.24.247) by www.bitwizard.nl with SMTP; 1 Dec 1999 01:09:11 -0000 Received: (qmail 15578 invoked by uid 501); 1 Dec 1999 01:09:11 -0000 Received: (qmail 14145 invoked from network); 1 Dec 1999 01:08:47 -0000 Received: from mail.redhat.com (199.183.24.239) by lists.redhat.com with SMTP; 1 Dec 1999 01:08:47 -0000 Received: from nirvana.ingames.com (root@ingames.no [195.159.15.5]) by mail.redhat.com (8.8.7/8.8.7) with ESMTP id UAA24524 for <linux-security@redhat.com>; Tue, 30 Nov 1999 20:08:44 -0500 Received: from glynn.ingames.com (glynn.cvg.no [195.159.15.204]) by nirvana.ingames.com (8.8.7/8.8.7) with SMTP id CAA23209; Wed, 1 Dec 1999 02:11:08 +0100 From: Glynn Clements <glynn@sensei.co.uk> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit Message-ID: <14404.30024.249000.591863@glynn.ingames.com> Date: Wed, 1 Dec 1999 02:09:25 +0100 (GMT--1:00) To: hgtaesml@umail.furryterror.org (Zygo Blaxell) Cc: <linux-security@redhat.com> Subject: [linux-security] Re: Programming ... In-Reply-To: <slrn847rok.dhq.zblaxell@washu.furryterror.org> References: <Pine.LNX.4.10.9911270940190.3182-100000@one.ctelcom.net> <m3iu2n4mlc.fsf@jfog-bb.dep.no> <slrn847rok.dhq.zblaxell@washu.furryterror.org> X-Mailer: VM 6.67 under 21.1 (patch 4) "Arches" XEmacs Lucid Zygo Blaxell wrote:> Deleting files in /tmp (or a user's home directory, for that matter) > is not a trivial operation from a security point of view. You can't > safely use "find" and "xargs"--or even "rm -rf"--unless you can guarantee > that no users have write access to the directory tree in question > (e.g. because the system is in single-user mode).One of the linux-admin subscribers had a neat alternative for /tmp cleaning, which I couldn't see any problems with. This involved creating a statically-linked "rm" binary, and then doing e.g. cp ~/static-rm ~/rm # installing the "rm" binary needs to be mv -f ~/rm /tmp/rm # safe against symlink games cd /tmp chroot /tmp /rm -rf . -- Glynn Clements <glynn@sensei.co.uk> From mail@mail.redhat.com Wed Dec 1 10:59:49 1999 Received: (qmail 5636 invoked from network); 1 Dec 1999 15:59:56 -0000 Received: from mail.redhat.com (199.183.24.239) by lists.redhat.com with SMTP; 1 Dec 1999 15:59:56 -0000 Received: from rosie.bitwizard.nl (root@13dyn148.delft.casema.net [212.64.76.148]) by mail.redhat.com (8.8.7/8.8.7) with ESMTP id KAA28667 for <linux-security@redhat.com>; Wed, 1 Dec 1999 10:59:49 -0500 Received: from cave.bitwizard.nl (root@cave.bitwizard.nl [192.168.234.1]) by rosie.bitwizard.nl (8.8.8/8.8.8) with ESMTP id QAA10109 for <linux-security@redhat.com>; Wed, 1 Dec 1999 16:59:40 +0100 Received: (from wolff@localhost) by cave.bitwizard.nl (8.9.3/8.9.3) id QAA13814 for linux-security@redhat.com; Wed, 1 Dec 1999 16:59:37 +0100 Approved: R.E.Wolff@BitWizard.nl Received: (qmail 13732 invoked by alias); 1 Dec 1999 15:48:06 -0000 Received: (qmail 13729 invoked from network); 1 Dec 1999 15:48:06 -0000 Received: from lists.redhat.com (199.183.24.247) by www.bitwizard.nl with SMTP; 1 Dec 1999 15:48:05 -0000 Received: (qmail 23300 invoked by uid 501); 1 Dec 1999 15:45:15 -0000 Received: (qmail 7409 invoked from network); 1 Dec 1999 15:29:35 -0000 Received: from mail.redhat.com (199.183.24.239) by lists.redhat.com with SMTP; 1 Dec 1999 15:29:35 -0000 Received: from blues.jpj.net (trevor@blues.jpj.net [204.97.17.146]) by mail.redhat.com (8.8.7/8.8.7) with ESMTP id KAA26530 for <linux-security@redhat.com>; Wed, 1 Dec 1999 10:29:34 -0500 Received: from localhost (trevor@localhost) by blues.jpj.net (right/backatcha) with SMTP id KAA14912; Wed, 1 Dec 1999 10:29:30 -0500 (EST) Date: Wed, 1 Dec 1999 10:29:30 -0500 (EST) From: Trevor Johnson <trevor@jpj.net> To: Antonomasia <ant@notatla.demon.co.uk> cc: linux-security@redhat.com Subject: [linux-security] Re: Programming .... In-Reply-To: <199911271503.PAA00680@notatla.demon.co.uk> Message-ID: <Pine.BSI.3.96.991201102657.13146H-100000@blues.jpj.net> MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Status: O Under "Security recommendations" at http://www.openbsd.org/porting.html are some tips that might apply. __ Trevor Johnson From mail@mail.redhat.com Fri Dec 3 18:48:21 1999 Received: (qmail 8955 invoked from network); 3 Dec 1999 23:48:23 -0000 Received: from mail.redhat.com (199.183.24.239) by lists.redhat.com with SMTP; 3 Dec 1999 23:48:23 -0000 Received: from rosie.bitwizard.nl (root@13dyn32.delft.casema.net [212.64.76.32]) by mail.redhat.com (8.8.7/8.8.7) with ESMTP id SAA04849 for <linux-security@redhat.com>; Fri, 3 Dec 1999 18:48:21 -0500 Received: from cave.bitwizard.nl (root@cave.bitwizard.nl [192.168.234.1]) by rosie.bitwizard.nl (8.8.8/8.8.8) with ESMTP id AAA25623 for <linux-security@redhat.com>; Sat, 4 Dec 1999 00:48:16 +0100 Received: (from wolff@localhost) by cave.bitwizard.nl (8.9.3/8.9.3) id AAA01671 for linux-security@redhat.com; Sat, 4 Dec 1999 00:48:14 +0100 Approved: R.E.Wolff@BitWizard.nl Received: (qmail 736 invoked by alias); 3 Dec 1999 15:57:35 -0000 Received: (qmail 733 invoked from network); 3 Dec 1999 15:57:35 -0000 Received: from lists.redhat.com (199.183.24.247) by www.bitwizard.nl with SMTP; 3 Dec 1999 15:57:35 -0000 Received: (qmail 32597 invoked by uid 501); 3 Dec 1999 15:57:34 -0000 Received: (qmail 32585 invoked from network); 3 Dec 1999 15:57:34 -0000 Received: from mail.redhat.com (199.183.24.239) by lists.redhat.com with SMTP; 3 Dec 1999 15:57:34 -0000 Received: from lux.krokus.com.pl (bartek@lux.krokus.com.pl [195.117.244.118]) by mail.redhat.com (8.8.7/8.8.7) with ESMTP id KAA05927 for <linux-security@redhat.com>; Fri, 3 Dec 1999 10:57:28 -0500 Received: from localhost (bartek@localhost) by lux.krokus.com.pl (8.8.7/8.8.7) with ESMTP id QAA15332 for <linux-security@redhat.com>; Fri, 3 Dec 1999 16:57:56 +0100 Date: Fri, 3 Dec 1999 16:57:56 +0100 (EET) From: Bartosz Lis <bartek@krokus.com.pl> To: linux-security@redhat.com Subject: [linux-security] Re: Programming ... Message-ID: <Pine.LNX.4.10.9912031601480.14907-100000@lux.krokus.com.pl> MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Hi, While looking for holes in the utility script, that Glynn Clements sent, I have realized that using "~/" may be dangerous. The original script: On Wed, 1 Dec 1999, Glynn Clements wrote: [---cut---]> cp ~/static-rm ~/rm # installing the "rm" binary needs to be > mv -f ~/rm /tmp/rm # safe against symlink games > cd /tmp > chroot /tmp /rm -rf .[---cut---] is very unlikely to be compromised. But if you'd like to write your own scripts using the above idea, you'd better change "~/" to absolute paths (i.e. /root/). Rogier Wolff <R.E.Wolff@BitWizard.nl>, with whom I have discussed security issues of that script, stressed that the script was intended to be run in multiuser mode. It will work well until the HOME variable evaluates to /root, thus it will fail in single user mode. Detailed explanation "~/" is replaced by bash with the value of "$HOME". This variable for root usually evaluates to "/root", but in single user mode it evaluates to "/". If trusted or static binaries are put for example in /root/bin and the binaries are referenced in scripts as ~/bin/something , bash will look for binaries in /bin (that is /bin/something) when in single user mode. Binaries from /bin are dynamically linked and if run chrooted to /tmp , library loader will look for /tmp/etc/ld.so.conf and /tmp/lib/lib*.so . If you are attacked by an intruder, who knows what you have in your scripts, he may put his Troyan horses to those locations. "~root/" or "~user/" seem to be safier. Bash takes user's home directory from /etc/passwd. When run in a script executed by bash, which was chrooted to /tmp , the /tmp/etc/passwd is consulted. Conclusions 1. Don't use "~/" in security related scripts or at least set the HOME variable. 2. Reconsider using "~user/" syntax in scripts that are run chrooted. Greetings, -- Bartosz Lis Krokus sp. z o.o. snail-mail: Sterlinga 26, 90-213 Lodz, Poland e-mail: B.Lis@krokus.com.pl phone: [POLAND](42) 63 00110 www: http://www.krokus.com.pl From mail@mail.redhat.com Wed Dec 8 16:08:16 1999 Received: (qmail 948 invoked from network); 8 Dec 1999 21:08:25 -0000 Received: from mail.redhat.com (199.183.24.239) by lists.redhat.com with SMTP; 8 Dec 1999 21:08:25 -0000 Received: from rosie.bitwizard.nl (root@14dyn67.delft.casema.net [212.64.77.67]) by mail.redhat.com (8.8.7/8.8.7) with ESMTP id QAA01427 for <linux-security@redhat.com>; Wed, 8 Dec 1999 16:08:16 -0500 Received: from cave.bitwizard.nl (root@cave.bitwizard.nl [192.168.234.1]) by rosie.bitwizard.nl (8.8.8/8.8.8) with ESMTP id WAA28613 for <linux-security@redhat.com>; Wed, 8 Dec 1999 22:08:07 +0100 Received: (from wolff@localhost) by cave.bitwizard.nl (8.9.3/8.9.3) id WAA22304 for linux-security@redhat.com; Wed, 8 Dec 1999 22:08:02 +0100 Approved: R.E.Wolff@BitWizard.nl Received: (qmail 20036 invoked by alias); 8 Dec 1999 19:36:15 -0000 Received: (qmail 20033 invoked from network); 8 Dec 1999 19:36:15 -0000 Received: from lists.redhat.com (199.183.24.247) by www.bitwizard.nl with SMTP; 8 Dec 1999 19:36:15 -0000 Received: (qmail 4480 invoked by uid 501); 8 Dec 1999 19:36:13 -0000 Received: (qmail 4451 invoked from network); 8 Dec 1999 19:36:13 -0000 Received: from mail.redhat.com (199.183.24.239) by lists.redhat.com with SMTP; 8 Dec 1999 19:36:13 -0000 Received: from baker.compeng.net (baker.v-wave.com [24.108.49.112]) by mail.redhat.com (8.8.7/8.8.7) with ESMTP id OAA28305 for <linux-security@redhat.com>; Wed, 8 Dec 1999 14:36:12 -0500 Received: (from mail@localhost) by baker.compeng.net (8.9.3/8.9.3) id MAA11828 for <linux-security@redhat.com>; Wed, 8 Dec 1999 12:28:45 -0700 X-Authentication-Warning: baker.compeng.net: mail set sender to <Blair.Lowe@compeng.net> using -f Received: from unknown(192.168.122.85) by baker.compeng.net via smap (V2.1) id xma011826; Wed, 8 Dec 99 12:28:21 -0700 Mime-Version: 1.0 X-Sender: blair.lowe@mail.pleasantview.compeng.net (Unverified) Message-Id: <v04220800b474616e4a47@[192.168.122.85]> In-Reply-To: <8825683F.005B6284.00@notes.r-u-i.com> References: <8825683F.005B6284.00@notes.r-u-i.com> Date: Wed, 8 Dec 1999 12:35:42 -0700 To: linux-security@redhat.com From: Blair Lowe <Blair.Lowe@compeng.net> Subject: IMAP security across the net. Content-Type: text/plain; charset="us-ascii" ; format="flowed" Hi, We are wondering if anyone knows the security features of IMAP. I know (at least I think I know;) that plain POPMAIL uses no encryption on the password, and that APOP provides some encryption. Ideally we would like a secure system that is accessible from any laptop anywhere on the net. Thanks, Blair. Computer Engineering Inc. http://www.compeng.net Phone: 780 499 5687 (9 - 5 MST) Fax: 780 435 0693 (24 Hours)