-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
______________________________________________________________________________
Caldera Systems, Inc. Security Advisory
Subject: local ROOT exploit in BRU
Advisory number: CSSA-2000-018.0
Issue date: 2000 June, 14
Cross reference:
______________________________________________________________________________
1. Problem Description
There is a serious vulnerability in the commandline option and logfile
handling of the BRU Backup Utility which can be exploited by a local
attacker to gain root access to the machine.
We ship BRU on the commercial software CD-ROM of our OpenLinux productline,
but it's not installed by default.
2. Vulnerable Versions
System Package
-----------------------------------------------------------
OpenLinux Desktop 2.3 up to BRU-15.1P-4
OpenLinux eServer 2.3 not included
and OpenLinux eBuilder
OpenLinux eDesktop 2.4 up to BRU-15.1D-8
3. Solution
Workaround:
If you do not need BRU, issue as root:
rpm -e BRU
Otherwise remove the suid-root bit by issuing as root:
chmod u-s /bru/bru /bin/bru
If you want to use BRU as a normal user, you have to point the
'BRUEXECLOG'
environment variable to a file writeable by the user, like
bash/sh:
BRUEXECLOG=~/.brulog
export BRUEXECLOG
tcsh/csh:
setenv BRUEXECLOG=~/.brulog
Also do ignore the
bru: [W171] warning - BRU must be owned by root and have suid bit set
warning on further BRU calls.
4. OpenLinux Desktop 2.3
See workaround above
5. OpenLinux eServer 2.3 and OpenLinux eBuilder for ECential 3.0
not included
6. OpenLinux eDesktop 2.4
See workaround above
7. References
This and other Caldera security resources are located at:
http://www.calderasystems.com/support/security/index.html
8. Disclaimer
Caldera Systems, Inc. is not responsible for the misuse of any of the
information we provide on this website and/or through our security
advisories. Our advisories are a service to our customers intended to
promote secure installation and use of Caldera OpenLinux.
9. Acknowledgements
Caldera Systems wishes to thank the Network Security department of Speakeasy
Networks for discovering and reporting the bug, and Enhanced Software
Technologies, Inc. for suggesting the workaround.
______________________________________________________________________________
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.1 (GNU/Linux)
Comment: For info see http://www.gnupg.org
iD8DBQE5R3Fl18sy83A/qfwRArQvAJ4kXFmdyA+bAEeaOkYmsfsJkhNpxACfYYxP
/TBrKh4Lxxpb/Pe9Z/pMMnw=K8/3
-----END PGP SIGNATURE-----
From mail@mail.redhat.com Jun 17:30:58 2000 -0400
Received: (qmail 23122 invoked from network); 15 Jun 2000 21:30:59 -0000
Received: from mail.redhat.com (199.183.24.239)
by lists.redhat.com with SMTP; 15 Jun 2000 21:30:59 -0000
Received: from lacrosse.corp.redhat.com (lacrosse.corp.redhat.com
[207.175.42.154])
by mail.redhat.com (8.8.7/8.8.7) with ESMTP id RAA01997;
Thu, 15 Jun 2000 17:30:58 -0400
Received: from localhost (porkchop.redhat.com [207.175.42.68])
by lacrosse.corp.redhat.com (8.9.3/8.9.3) with SMTP id RAA26187;
Thu, 15 Jun 2000 17:30:56 -0400
Message-Id: <200006152130.RAA26187@lacrosse.corp.redhat.com>
Subject: [RHSA-2000:036-01] New emacs packages available
Content-transfer-encoding: 8bit
Approved: ewt@redhat.com
To: redhat-watch-list@redhat.com
From: bugzilla@redhat.com
Cc: linux-security@redhat.com
Content-type: text/plain; charset="iso-8859-1"
Mime-version: 1.0
Date: Thu, 15 Jun 2000 17:30 -0400
---------------------------------------------------------------------
Red Hat, Inc. Security Advisory
Synopsis: New emacs packages available
Advisory ID: RHSA-2000:036-01
Issue date: 2000-06-15
Updated on: 2000-06-15
Product: Red Hat Linux
Keywords: emacs vulnerability
Cross references: N/A
---------------------------------------------------------------------
1. Topic:
With emacs < 20.7, unprivileged local users can eavesdrop the communication
between Emacs and its subprocesses.
2. Relevant releases/architectures:
Red Hat Linux 6.0 - i386 alpha sparc
Red Hat Linux 6.1 - i386 alpha sparc
Red Hat Linux 6.2 - i386 alpha sparc
3. Problem description:
With emacs < 20.7, unprivileged local users can eavesdrop the communication
between Emacs and its subprocesses.
This release also fix many minor problems.
The problem also exists for Red Hat 5.x. Unfortunately, the fixes require UNIX98
PTYs. This is only available on Red Hat 6.x and higher. If this problem concerns
you, an upgrade is recommended.
4. Solution:
For each RPM for your particular architecture, run:
rpm -Fvh [filename]
where filename is the name of the RPM.
5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):
11335 - emacs-nox built with X11 locale
10948 - emacs-nox does not accept pasted data
10798 - Emacs shell-script mode doesn't know about bash2
9895 - Nit: png file marked as conf file.
6. RPMs required:
Red Hat Linux 6.2:
intel:
ftp://ftp.redhat.com/redhat/updates/6.2/i386/emacs-20.7-1.i386.rpm
ftp://ftp.redhat.com/redhat/updates/6.2/i386/emacs-el-20.7-1.i386.rpm
ftp://ftp.redhat.com/redhat/updates/6.2/i386/emacs-X11-20.7-1.i386.rpm
ftp://ftp.redhat.com/redhat/updates/6.2/i386/emacs-leim-20.7-1.i386.rpm
ftp://ftp.redhat.com/redhat/updates/6.2/i386/emacs-nox-20.7-1.i386.rpm
alpha:
ftp://ftp.redhat.com/redhat/updates/6.2/alpha/emacs-20.7-1.alpha.rpm
ftp://ftp.redhat.com/redhat/updates/6.2/alpha/emacs-el-20.7-1.alpha.rpm
ftp://ftp.redhat.com/redhat/updates/6.2/alpha/emacs-X11-20.7-1.alpha.rpm
ftp://ftp.redhat.com/redhat/updates/6.2/alpha/emacs-leim-20.7-1.alpha.rpm
ftp://ftp.redhat.com/redhat/updates/6.2/alpha/emacs-nox-20.7-1.alpha.rpm
sparc:
ftp://ftp.redhat.com/redhat/updates/6.2/sparc/emacs-20.7-1.sparc.rpm
ftp://ftp.redhat.com/redhat/updates/6.2/sparc/emacs-el-20.7-1.sparc.rpm
ftp://ftp.redhat.com/redhat/updates/6.2/sparc/emacs-X11-20.7-1.sparc.rpm
ftp://ftp.redhat.com/redhat/updates/6.2/sparc/emacs-leim-20.7-1.sparc.rpm
ftp://ftp.redhat.com/redhat/updates/6.2/sparc/emacs-nox-20.7-1.sparc.rpm
sources:
ftp://ftp.redhat.com/redhat/updates/6.2/SRPMS/emacs-20.7-1.src.rpm
7. Verification:
MD5 sum Package Name
--------------------------------------------------------------------------
4338ef85b6f9c374879eeee77ae0eee9 6.2/SRPMS/emacs-20.7-1.src.rpm
9fbdc8b24f30bc0784a75b5d169df0c7 6.2/alpha/emacs-20.7-1.alpha.rpm
c008af143f571ae71d4f5415bd82968d 6.2/alpha/emacs-X11-20.7-1.alpha.rpm
718587a7b03c7b216d8c7825bedf1a0f 6.2/alpha/emacs-el-20.7-1.alpha.rpm
12add74edfdbb60bbf62db1a6fd8f89e 6.2/alpha/emacs-leim-20.7-1.alpha.rpm
1fa10098c9e56296d8d10a8e198b6e12 6.2/alpha/emacs-nox-20.7-1.alpha.rpm
e51141f6c521cf8009cc94669e00dc3f 6.2/i386/emacs-20.7-1.i386.rpm
7e2254b2c46deeb6a1ee8840cd4b2c2a 6.2/i386/emacs-X11-20.7-1.i386.rpm
27ef1a3ba0d97968ccca79d5421b8a1b 6.2/i386/emacs-el-20.7-1.i386.rpm
9057e85bf9cfd24057d0bdc8f16164ad 6.2/i386/emacs-leim-20.7-1.i386.rpm
19a8145b213dbcb54a3d8bad1fadcda0 6.2/i386/emacs-nox-20.7-1.i386.rpm
b4d69bb3e1ca46e2e164b2c342e7e615 6.2/sparc/emacs-20.7-1.sparc.rpm
2fc732546034395a8921fd2541f49fa1 6.2/sparc/emacs-X11-20.7-1.sparc.rpm
10e8880bf285287f328cf28888e0dcf1 6.2/sparc/emacs-el-20.7-1.sparc.rpm
0cc9c30a1bb74774913603def608fc55 6.2/sparc/emacs-leim-20.7-1.sparc.rpm
a6ae2d4b6afcb0022d59183b12472361 6.2/sparc/emacs-nox-20.7-1.sparc.rpm
These packages are GPG signed by Red Hat, Inc. for security. Our key
is available at:
http://www.redhat.com/corp/contact.html
You can verify each package with the following command:
rpm --checksig <filename>
If you only wish to verify that each package has not been corrupted or
tampered with, examine only the md5sum with the following command:
rpm --checksig --nogpg <filename>
8. References:
http://www.securityfocus.com/bid/1125
From mail@mail.redhat.com Jun 19:00:12 2000 -0400
Received: (qmail 8172 invoked from network); 15 Jun 2000 23:00:13 -0000
Received: from mail.redhat.com (199.183.24.239)
by lists.redhat.com with SMTP; 15 Jun 2000 23:00:13 -0000
Received: from lacrosse.corp.redhat.com (root@lacrosse.corp.redhat.com
[207.175.42.154])
by mail.redhat.com (8.8.7/8.8.7) with ESMTP id TAA12860;
Thu, 15 Jun 2000 19:00:12 -0400
Received: from localhost (porkchop.redhat.com [207.175.42.68])
by lacrosse.corp.redhat.com (8.9.3/8.9.3) with SMTP id TAA14652;
Thu, 15 Jun 2000 19:00:10 -0400
Message-Id: <200006152300.TAA14652@lacrosse.corp.redhat.com>
Subject: [RHSA-2000:025-12] Updated Kerberos 5 packages are now available for
Red Hat Linux.
Content-transfer-encoding: 8bit
Approved: ewt@redhat.com
To: redhat-watch-list@redhat.com, linux-security@redhat.com
From: bugzilla@redhat.com
Cc:
Content-type: text/plain; charset="iso-8859-1"
Mime-version: 1.0
Date: Thu, 15 Jun 2000 19:00 -0400
---------------------------------------------------------------------
Red Hat, Inc. Security Advisory
Synopsis: Updated Kerberos 5 packages are now available for Red Hat
Linux.
Advisory ID: RHSA-2000:025-12
Issue date: 2000-05-16
Updated on: 2000-06-15
Product: Red Hat Linux
Keywords: N/A
Cross references: N/A
---------------------------------------------------------------------
1. Topic:
Security vulnerabilities have been found in the Kerberos 5 implementation
shipped with Red Hat Linux 6.2.
2. Relevant releases/architectures:
Red Hat Linux 6.2 - i386 alpha sparc
3. Problem description:
A number of possible buffer overruns were found in libraries included
in the affected packages. A denial-of-service vulnerability was also found
in the ksu program.
* A remote user may gain unauthorized root access to a machine running
services authenticated with Kerberos 4.
* A remote user may gain unauthorized root access to a machine running
krshd, regardless of whether the program is configured to accept
Kerberos 4 authentication.
* A local user may gain unauthorized root access by exploiting v4rcp
or ksu.
* A remote user can cause a KDC to become unresponsive or crash by sending
it an improperly formatted request.
* A remote user may execute certain FTP commands without authorization
on systems using the FTP server included in the krb5-workstation
package.
* An attacker with access to a local account may gain unauthorized
root access on systems using the FTP server included in the
krb5-workstation package.
4. Solution:
For each RPM for your particular architecture, run:
rpm -Fvh [filename]
where filename is the name of the RPM.
5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):
10653 - 'stat' unresolved on "libkrb5.so.2.2" load
11496 - security-updated krb5 packages fail dependencies
6. RPMs required:
Red Hat Linux 6.2:
intel:
ftp://ftp.redhat.com/redhat/updates/6.2/i386/krb5-configs-1.1.1-21.i386.rpm
ftp://ftp.redhat.com/redhat/updates/6.2/i386/krb5-devel-1.1.1-21.i386.rpm
ftp://ftp.redhat.com/redhat/updates/6.2/i386/krb5-libs-1.1.1-21.i386.rpm
ftp://ftp.redhat.com/redhat/updates/6.2/i386/krb5-server-1.1.1-21.i386.rpm
ftp://ftp.redhat.com/redhat/updates/6.2/i386/krb5-workstation-1.1.1-21.i386.rpm
alpha:
ftp://ftp.redhat.com/redhat/updates/6.2/alpha/krb5-configs-1.1.1-21.alpha.rpm
ftp://ftp.redhat.com/redhat/updates/6.2/alpha/krb5-devel-1.1.1-21.alpha.rpm
ftp://ftp.redhat.com/redhat/updates/6.2/alpha/krb5-libs-1.1.1-21.alpha.rpm
ftp://ftp.redhat.com/redhat/updates/6.2/alpha/krb5-server-1.1.1-21.alpha.rpm
ftp://ftp.redhat.com/redhat/updates/6.2/alpha/krb5-workstation-1.1.1-21.alpha.rpm
sparc:
ftp://ftp.redhat.com/redhat/updates/6.2/sparc/krb5-configs-1.1.1-21.sparc.rpm
ftp://ftp.redhat.com/redhat/updates/6.2/sparc/krb5-devel-1.1.1-21.sparc.rpm
ftp://ftp.redhat.com/redhat/updates/6.2/sparc/krb5-libs-1.1.1-21.sparc.rpm
ftp://ftp.redhat.com/redhat/updates/6.2/sparc/krb5-server-1.1.1-21.sparc.rpm
ftp://ftp.redhat.com/redhat/updates/6.2/sparc/krb5-workstation-1.1.1-21.sparc.rpm
sources:
ftp://ftp.redhat.com/redhat/updates/6.2/SRPMS/krb5-1.1.1-21.src.rpm
7. Verification:
MD5 sum Package Name
--------------------------------------------------------------------------
220dd8648e6560215475f29f12cf7fbf 6.2/SRPMS/krb5-1.1.1-21.src.rpm
506aa4887dbb63ee0fdf1b0617db5d92 6.2/alpha/krb5-configs-1.1.1-21.alpha.rpm
19d3648a64b259a3a83ef70ecf3c1d3e 6.2/alpha/krb5-devel-1.1.1-21.alpha.rpm
ea30e1a247aa7d4c516ead13c825c8cb 6.2/alpha/krb5-libs-1.1.1-21.alpha.rpm
55805f5199f7c2c24c03f4609a2cbd81 6.2/alpha/krb5-server-1.1.1-21.alpha.rpm
a98473df43eedf564efe9a05b30c2baf 6.2/alpha/krb5-workstation-1.1.1-21.alpha.rpm
43d0af74bb628d446dc8781e9d0ae08b 6.2/i386/krb5-configs-1.1.1-21.i386.rpm
d13ac3cc0e680b0e452aeb34749ea7b4 6.2/i386/krb5-devel-1.1.1-21.i386.rpm
76882356337e55cd3bd5e0d5cfa454de 6.2/i386/krb5-libs-1.1.1-21.i386.rpm
93efde6cc79b16245f5e27e793a8a4ad 6.2/i386/krb5-server-1.1.1-21.i386.rpm
aa00aa8b26a50b75317f51e447a17420 6.2/i386/krb5-workstation-1.1.1-21.i386.rpm
ff7f959f22e80e9aeabb3a1c6602e225 6.2/sparc/krb5-configs-1.1.1-21.sparc.rpm
1cce9df9c5591fe43c1340334d01d6be 6.2/sparc/krb5-devel-1.1.1-21.sparc.rpm
cc67fdfad917452f383e45a9945e5ae0 6.2/sparc/krb5-libs-1.1.1-21.sparc.rpm
0215d914b0d9e2f78830ef7df9b14fea 6.2/sparc/krb5-server-1.1.1-21.sparc.rpm
3f564e722e61c1e4e8bd1a3faa108b3d 6.2/sparc/krb5-workstation-1.1.1-21.sparc.rpm
These packages are GPG signed by Red Hat, Inc. for security. Our key
is available at:
http://www.redhat.com/corp/contact.html
You can verify each package with the following command:
rpm --checksig <filename>
If you only wish to verify that each package has not been corrupted or
tampered with, examine only the md5sum with the following command:
rpm --checksig --nogpg <filename>
8. References:
http://www.securityfocus.com/bid/1220
http://www.securityfocus.com/bid/1338
http://web.mit.edu/kerberos/www/advisories/index.html
Thanks to Chris Evans, Mike Friedman, Jim Paris, Matt Power, Andrew
Newman, Christopher R. Thompson, and Marcus Watts for reporting these
problems to us and the Kerberos 5 team.
From mail@mail.redhat.com Jun 04:23:51 2000 -0400
Received: (qmail 5588 invoked from network); 16 Jun 2000 08:23:54 -0000
Received: from mail.redhat.com (199.183.24.239)
by lists.redhat.com with SMTP; 16 Jun 2000 08:23:54 -0000
Received: from lacrosse.corp.redhat.com (root@lacrosse.corp.redhat.com
[207.175.42.154])
by mail.redhat.com (8.8.7/8.8.7) with ESMTP id EAA30377;
Fri, 16 Jun 2000 04:23:51 -0400
Received: from localhost (porkchop.redhat.com [207.175.42.68])
by lacrosse.corp.redhat.com (8.9.3/8.9.3) with SMTP id EAA15484;
Fri, 16 Jun 2000 04:23:50 -0400
Message-Id: <200006160823.EAA15484@lacrosse.corp.redhat.com>
Subject: [RHSA-2000:025-13] Updated Kerberos 5 packages are now available for
Red Hat Linux.
Content-transfer-encoding: 8bit
Approved: ewt@redhat.com
To: redhat-watch-list@redhat.com, linux-security@redhat.com
From: bugzilla@redhat.com
Cc:
Content-type: text/plain; charset="iso-8859-1"
Mime-version: 1.0
Date: Fri, 16 Jun 2000 04:23 -0400
---------------------------------------------------------------------
Red Hat, Inc. Security Advisory
Synopsis: Updated Kerberos 5 packages are now available for Red Hat
Linux.
Advisory ID: RHSA-2000:025-13
Issue date: 2000-05-16
Updated on: 2000-06-16
Product: Red Hat Linux
Keywords: N/A
Cross references: N/A
---------------------------------------------------------------------
1. Topic:
Security vulnerabilities have been found in the Kerberos 5 implementation
shipped with Red Hat Linux 6.2.
2. Relevant releases/architectures:
Red Hat Linux 6.2 - i386 alpha sparc
3. Problem description:
A number of possible buffer overruns were found in libraries included
in the affected packages. A denial-of-service vulnerability was also found
in the ksu program.
* A remote user may gain unauthorized root access to a machine running
services authenticated with Kerberos 4.
* A remote user may gain unauthorized root access to a machine running
krshd, regardless of whether the program is configured to accept
Kerberos 4 authentication.
* A local user may gain unauthorized root access by exploiting v4rcp
or ksu.
* A remote user can cause a KDC to become unresponsive or crash by sending
it an improperly formatted request.
* A remote user may execute certain FTP commands without authorization
on systems using the FTP server included in the krb5-workstation
package.
* An attacker with access to a local account may gain unauthorized
root access on systems using the FTP server included in the
krb5-workstation package.
The prior errata announcement for these package contained incorrect md5sum
values. The correct md5sums are listed below.
4. Solution:
For each RPM for your particular architecture, run:
rpm -Fvh [filename]
where filename is the name of the RPM.
5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):
10653 - 'stat' unresolved on "libkrb5.so.2.2" load
11496 - security-updated krb5 packages fail dependencies
6. RPMs required:
Red Hat Linux 6.2:
intel:
ftp://updates.redhat.com/6.2/i386/krb5-configs-1.1.1-21.i386.rpm
ftp://updates.redhat.com/6.2/i386/krb5-devel-1.1.1-21.i386.rpm
ftp://updates.redhat.com/6.2/i386/krb5-libs-1.1.1-21.i386.rpm
ftp://updates.redhat.com/6.2/i386/krb5-server-1.1.1-21.i386.rpm
ftp://updates.redhat.com/6.2/i386/krb5-workstation-1.1.1-21.i386.rpm
alpha:
ftp://updates.redhat.com/6.2/alpha/krb5-configs-1.1.1-21.alpha.rpm
ftp://updates.redhat.com/6.2/alpha/krb5-devel-1.1.1-21.alpha.rpm
ftp://updates.redhat.com/6.2/alpha/krb5-libs-1.1.1-21.alpha.rpm
ftp://updates.redhat.com/6.2/alpha/krb5-server-1.1.1-21.alpha.rpm
ftp://updates.redhat.com/6.2/alpha/krb5-workstation-1.1.1-21.alpha.rpm
sparc:
ftp://updates.redhat.com/6.2/sparc/krb5-configs-1.1.1-21.sparc.rpm
ftp://updates.redhat.com/6.2/sparc/krb5-devel-1.1.1-21.sparc.rpm
ftp://updates.redhat.com/6.2/sparc/krb5-libs-1.1.1-21.sparc.rpm
ftp://updates.redhat.com/6.2/sparc/krb5-server-1.1.1-21.sparc.rpm
ftp://updates.redhat.com/6.2/sparc/krb5-workstation-1.1.1-21.sparc.rpm
sources:
ftp://updates.redhat.com/6.2/SRPMS/krb5-1.1.1-21.src.rpm
7. Verification:
MD5 sum Package Name
--------------------------------------------------------------------------
f181b2037de905e80288e387b60f4e52 6.2/SRPMS/krb5-1.1.1-21.src.rpm
f561bcf39652922fe17c0f8f9d657a92 6.2/alpha/krb5-configs-1.1.1-21.alpha.rpm
182af71accb3ed83e8c3775b52474ea1 6.2/alpha/krb5-devel-1.1.1-21.alpha.rpm
ea27afca5259f61dc990859a68c08efc 6.2/alpha/krb5-libs-1.1.1-21.alpha.rpm
12cd0badc97753ede1ab24741e8b127a 6.2/alpha/krb5-server-1.1.1-21.alpha.rpm
583ca4a6755bdc4a248eaa5fe5a37418 6.2/alpha/krb5-workstation-1.1.1-21.alpha.rpm
3616f4ca518aebf7a6aba1fe9a8858fe 6.2/i386/krb5-configs-1.1.1-21.i386.rpm
d61dbe28620c5ff5fc8f6f87802875c4 6.2/i386/krb5-devel-1.1.1-21.i386.rpm
df9cca2508bc2a7bcfabb75ead5ec176 6.2/i386/krb5-libs-1.1.1-21.i386.rpm
a43f18ed47e8b59142c37460f9202b25 6.2/i386/krb5-server-1.1.1-21.i386.rpm
0fe3ee19148e92ac7b5d7a04f14168d0 6.2/i386/krb5-workstation-1.1.1-21.i386.rpm
b31276f906d284cbfc3afb03b7373ddb 6.2/sparc/krb5-configs-1.1.1-21.sparc.rpm
c29e9f755f42ca1c3112d8ebb4dc65df 6.2/sparc/krb5-devel-1.1.1-21.sparc.rpm
cd7af0e48f5144fa9020319e88ca8db4 6.2/sparc/krb5-libs-1.1.1-21.sparc.rpm
e4155d32ad39fd1989a60e8ff3d2562d 6.2/sparc/krb5-server-1.1.1-21.sparc.rpm
cbecb34317007c04480e258c3cf859bb 6.2/sparc/krb5-workstation-1.1.1-21.sparc.rpm
These packages are GPG signed by Red Hat, Inc. for security. Our key
is available at:
http://www.redhat.com/corp/contact.html
You can verify each package with the following command:
rpm --checksig <filename>
If you only wish to verify that each package has not been corrupted or
tampered with, examine only the md5sum with the following command:
rpm --checksig --nogpg <filename>
8. References:
http://www.securityfocus.com/bid/1220
http://www.securityfocus.com/bid/1338
http://web.mit.edu/kerberos/www/advisories/index.html
Thanks to Chris Evans, Mike Friedman, Jim Paris, Matt Power, Andrew
Newman, Christopher R. Thompson, and Marcus Watts for reporting these
problems to us and the Kerberos 5 team.
From mail@mail.redhat.com Jun 12:38:18 2000 -0400
Received: (qmail 18983 invoked from network); 21 Jun 2000 16:38:20 -0000
Received: from mail.redhat.com (199.183.24.239)
by lists.redhat.com with SMTP; 21 Jun 2000 16:38:20 -0000
Received: from lacrosse.corp.redhat.com (root@lacrosse.corp.redhat.com
[207.175.42.154])
by mail.redhat.com (8.8.7/8.8.7) with ESMTP id MAA30113;
Wed, 21 Jun 2000 12:38:18 -0400
Received: from localhost (porkchop.redhat.com [207.175.42.68])
by lacrosse.corp.redhat.com (8.9.3/8.9.3) with SMTP id MAA11647;
Wed, 21 Jun 2000 12:38:17 -0400
Message-Id: <200006211638.MAA11647@lacrosse.corp.redhat.com>
Subject: [RHSA-2000:037-01] New Linux kernel fixes security bug
Content-transfer-encoding: 8bit
Approved: ewt@redhat.com
To: redhat-watch-list@redhat.com, linux-security@redhat.com
From: bugzilla@redhat.com
Cc: bugtraq@securityfocus.com
Content-type: text/plain; charset="iso-8859-1"
Mime-version: 1.0
Date: Wed, 21 Jun 2000 12:38 -0400
---------------------------------------------------------------------
Red Hat, Inc. Security Advisory
Synopsis: New Linux kernel fixes security bug
Advisory ID: RHSA-2000:037-01
Issue date: 2000-06-20
Updated on: 2000-06-20
Product: Red Hat Linux
Keywords: capabilities setuid suid agpgart 810 aacraid 3x90x MegaRAID
Acenic
Cross references: N/A
---------------------------------------------------------------------
1. Topic:
This new kernel release fixes a security hole that could
affect any setuid program on the system. In addition,
several accumulated fixes are included.
2. Relevant releases/architectures:
Red Hat Linux 6.0 - i386 alpha sparc
Red Hat Linux 6.1 - i386 alpha sparc
Red Hat Linux 6.2 - i386 alpha sparc
3. Problem description:
A security bug involving setuid programs is fixed in
this kernel.
Added or updated drivers include:
Updated AMI MegaRAID driver
Updated Acenic Gigabit Ethernet driver
Added Adaptec RAID (aacraid) driver
Updated to latest 3c90x driver from 3Com
Updated agpgart handling for latest Intel 810 chipset
Updated SCSI error handling
An error case in raw I/O handling was fixed.
4. Solution:
For each RPM for your particular architecture, run:
rpm -Fvh [filename]
where filename is the name of the RPM.
5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):
11998 - Local root vulnerability in the kernel capabilities feature
6. RPMs required:
Red Hat Linux 6.2:
intel:
ftp://updates.redhat.com/6.2/i386/kernel-2.2.16-3.i386.rpm
ftp://updates.redhat.com/6.2/i386/kernel-headers-2.2.16-3.i386.rpm
ftp://updates.redhat.com/6.2/i386/kernel-source-2.2.16-3.i386.rpm
ftp://updates.redhat.com/6.2/i386/kernel-doc-2.2.16-3.i386.rpm
ftp://updates.redhat.com/6.2/i386/kernel-utils-2.2.16-3.i386.rpm
ftp://updates.redhat.com/6.2/i386/kernel-smp-2.2.16-3.i386.rpm
ftp://updates.redhat.com/6.2/i386/kernel-BOOT-2.2.16-3.i386.rpm
ftp://updates.redhat.com/6.2/i386/kernel-pcmcia-cs-2.2.16-3.i386.rpm
ftp://updates.redhat.com/6.2/i386/kernel-ibcs-2.2.16-3.i386.rpm
alpha:
ftp://updates.redhat.com/6.2/alpha/kernel-2.2.16-3.alpha.rpm
ftp://updates.redhat.com/6.2/alpha/kernel-headers-2.2.16-3.alpha.rpm
ftp://updates.redhat.com/6.2/alpha/kernel-source-2.2.16-3.alpha.rpm
ftp://updates.redhat.com/6.2/alpha/kernel-doc-2.2.16-3.alpha.rpm
ftp://updates.redhat.com/6.2/alpha/kernel-utils-2.2.16-3.alpha.rpm
ftp://updates.redhat.com/6.2/alpha/kernel-smp-2.2.16-3.alpha.rpm
ftp://updates.redhat.com/6.2/alpha/kernel-BOOT-2.2.16-3.alpha.rpm
sparc:
ftp://updates.redhat.com/6.2/sparc/kernel-2.2.16-3.sparc.rpm
ftp://updates.redhat.com/6.2/sparc/kernel-headers-2.2.16-3.sparc.rpm
ftp://updates.redhat.com/6.2/sparc/kernel-source-2.2.16-3.sparc.rpm
ftp://updates.redhat.com/6.2/sparc/kernel-doc-2.2.16-3.sparc.rpm
ftp://updates.redhat.com/6.2/sparc/kernel-utils-2.2.16-3.sparc.rpm
ftp://updates.redhat.com/6.2/sparc/kernel-smp-2.2.16-3.sparc.rpm
ftp://updates.redhat.com/6.2/sparc/kernel-BOOT-2.2.16-3.sparc.rpm
sources:
ftp://updates.redhat.com/6.2/SRPMS/kernel-2.2.16-3.src.rpm
7. Verification:
MD5 sum Package Name
--------------------------------------------------------------------------
7135cd70a5b0896574a38363867637e2 6.2/SRPMS/kernel-2.2.16-3.src.rpm
8d2d1a5312c847a422633abde5178733 6.2/alpha/kernel-2.2.16-3.alpha.rpm
358b77b381dcf7e6e95e181eb271f368 6.2/alpha/kernel-BOOT-2.2.16-3.alpha.rpm
3306014cf0d5d3cd6aaf3eb7b495c786 6.2/alpha/kernel-doc-2.2.16-3.alpha.rpm
89e60b43d47202dc7a237e287b60a39f 6.2/alpha/kernel-headers-2.2.16-3.alpha.rpm
6a166b661bc6e6b078d111c2a18ef1bf 6.2/alpha/kernel-smp-2.2.16-3.alpha.rpm
88f53a2105dbf03801b10abc1ddfbbd8 6.2/alpha/kernel-source-2.2.16-3.alpha.rpm
51914ffb09fbe7df6d12a10f713f0b0a 6.2/alpha/kernel-utils-2.2.16-3.alpha.rpm
f639d81c76c4a35332f3f4b8bae40b0c 6.2/i386/kernel-2.2.16-3.i386.rpm
08aa0ee0e630c0b740bca1eb630b598c 6.2/i386/kernel-BOOT-2.2.16-3.i386.rpm
e6de480a599e9b4faa7cceab4ed73ce9 6.2/i386/kernel-doc-2.2.16-3.i386.rpm
438d3cfcf28ca7beb39a94b4bd438cec 6.2/i386/kernel-headers-2.2.16-3.i386.rpm
2b5026d45dc07324324dcb4cf936afe4 6.2/i386/kernel-ibcs-2.2.16-3.i386.rpm
dcdf1ba8a2154b15789a3f660c71c166 6.2/i386/kernel-pcmcia-cs-2.2.16-3.i386.rpm
94a8f4a294d743b78078274ef30722b8 6.2/i386/kernel-smp-2.2.16-3.i386.rpm
409750698f4d7a21ba3527880c2017fe 6.2/i386/kernel-source-2.2.16-3.i386.rpm
4a7bb771616f294803342e71912a2847 6.2/i386/kernel-utils-2.2.16-3.i386.rpm
4deba2b9f3285d63b96daef2bcd599e4 6.2/sparc/kernel-2.2.16-3.sparc.rpm
514d9ce2b85ec5954bf47e609a7f2048 6.2/sparc/kernel-BOOT-2.2.16-3.sparc.rpm
d776ec3b12207a7122e13c802102b731 6.2/sparc/kernel-doc-2.2.16-3.sparc.rpm
43fc3b6f6c71b232407c6099f444d9e8 6.2/sparc/kernel-headers-2.2.16-3.sparc.rpm
3c509252e3d9a681afc2598ad28a688a 6.2/sparc/kernel-smp-2.2.16-3.sparc.rpm
0839ab7161bc75b40b09a0bbf7625a74 6.2/sparc/kernel-source-2.2.16-3.sparc.rpm
a9d8ebf3009225593ca63e9d587bd123 6.2/sparc/kernel-utils-2.2.16-3.sparc.rpm
These packages are GPG signed by Red Hat, Inc. for security. Our key
is available at:
http://www.redhat.com/corp/contact.html
You can verify each package with the following command:
rpm --checksig <filename>
If you only wish to verify that each package has not been corrupted or
tampered with, examine only the md5sum with the following command:
rpm --checksig --nogpg <filename>
8. References:
N/A
From mail@mail.redhat.com Jun 16:35:36 2000 -0400
Received: (qmail 17596 invoked from network); 21 Jun 2000 20:35:36 -0000
Received: from mail.redhat.com (199.183.24.239)
by lists.redhat.com with SMTP; 21 Jun 2000 20:35:36 -0000
Received: from lacrosse.corp.redhat.com (root@lacrosse.corp.redhat.com
[207.175.42.154])
by mail.redhat.com (8.8.7/8.8.7) with ESMTP id QAA27056;
Wed, 21 Jun 2000 16:35:36 -0400
Received: from localhost (porkchop.redhat.com [207.175.42.68])
by lacrosse.corp.redhat.com (8.9.3/8.9.3) with SMTP id QAA09463;
Wed, 21 Jun 2000 16:35:35 -0400
Message-Id: <200006212035.QAA09463@lacrosse.corp.redhat.com>
Subject: [RHSA-2000:037-02] New Linux kernel fixes security bug
Content-transfer-encoding: 8bit
Approved: ewt@redhat.com
To: redhat-watch-list@redhat.com, linux-security@redhat.com
From: bugzilla@redhat.com
Cc: bugtraq@securityfocus.com
Content-type: text/plain; charset="iso-8859-1"
Mime-version: 1.0
Date: Wed, 21 Jun 2000 16:35 -0400
---------------------------------------------------------------------
Red Hat, Inc. Security Advisory
Synopsis: New Linux kernel fixes security bug
Advisory ID: RHSA-2000:037-01
Issue date: 2000-06-20
Updated on: 2000-06-20
Product: Red Hat Linux
Keywords: capabilities setuid suid agpgart 810 aacraid 3x90x MegaRAID
Acenic
Cross references: N/A
---------------------------------------------------------------------
1. Topic:
This new kernel release fixes a security hole that could
affect any setuid program on the system. In addition,
several accumulated fixes are included.
2. Relevant releases/architectures:
Red Hat Linux 6.0 - i386 alpha sparc
Red Hat Linux 6.1 - i386 alpha sparc
Red Hat Linux 6.2 - i386 alpha sparc
3. Problem description:
A security bug involving setuid programs is fixed in
this kernel.
Added or updated drivers include:
Updated AMI MegaRAID driver
Updated Acenic Gigabit Ethernet driver
Added Adaptec RAID (aacraid) driver
Updated to latest 3c90x driver from 3Com
Updated agpgart handling for latest Intel 810 chipset
Updated SCSI error handling
An error case in raw I/O handling was fixed.
4. Solution:
For each RPM for your particular architecture, run:
rpm -Fvh [filename]
where filename is the name of the RPM.
5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):
11998 - Local root vulnerability in the kernel capabilities feature
6. RPMs required:
Red Hat Linux 6.2:
intel:
ftp://updates.redhat.com/6.2/i386/kernel-2.2.16-3.i386.rpm
ftp://updates.redhat.com/6.2/i386/kernel-headers-2.2.16-3.i386.rpm
ftp://updates.redhat.com/6.2/i386/kernel-source-2.2.16-3.i386.rpm
ftp://updates.redhat.com/6.2/i386/kernel-doc-2.2.16-3.i386.rpm
ftp://updates.redhat.com/6.2/i386/kernel-utils-2.2.16-3.i386.rpm
ftp://updates.redhat.com/6.2/i386/kernel-smp-2.2.16-3.i386.rpm
ftp://updates.redhat.com/6.2/i386/kernel-BOOT-2.2.16-3.i386.rpm
ftp://updates.redhat.com/6.2/i386/kernel-pcmcia-cs-2.2.16-3.i386.rpm
ftp://updates.redhat.com/6.2/i386/kernel-ibcs-2.2.16-3.i386.rpm
alpha:
ftp://updates.redhat.com/6.2/alpha/kernel-2.2.16-3.alpha.rpm
ftp://updates.redhat.com/6.2/alpha/kernel-headers-2.2.16-3.alpha.rpm
ftp://updates.redhat.com/6.2/alpha/kernel-source-2.2.16-3.alpha.rpm
ftp://updates.redhat.com/6.2/alpha/kernel-doc-2.2.16-3.alpha.rpm
ftp://updates.redhat.com/6.2/alpha/kernel-utils-2.2.16-3.alpha.rpm
ftp://updates.redhat.com/6.2/alpha/kernel-smp-2.2.16-3.alpha.rpm
ftp://updates.redhat.com/6.2/alpha/kernel-BOOT-2.2.16-3.alpha.rpm
sparc:
ftp://updates.redhat.com/6.2/sparc/kernel-2.2.16-3.sparc.rpm
ftp://updates.redhat.com/6.2/sparc/kernel-headers-2.2.16-3.sparc.rpm
ftp://updates.redhat.com/6.2/sparc/kernel-source-2.2.16-3.sparc.rpm
ftp://updates.redhat.com/6.2/sparc/kernel-doc-2.2.16-3.sparc.rpm
ftp://updates.redhat.com/6.2/sparc/kernel-utils-2.2.16-3.sparc.rpm
ftp://updates.redhat.com/6.2/sparc/kernel-smp-2.2.16-3.sparc.rpm
ftp://updates.redhat.com/6.2/sparc/kernel-BOOT-2.2.16-3.sparc.rpm
sources:
ftp://updates.redhat.com/6.2/SRPMS/kernel-2.2.16-3.src.rpm
7. Verification:
MD5 sum Package Name
--------------------------------------------------------------------------
7135cd70a5b0896574a38363867637e2 6.2/SRPMS/kernel-2.2.16-3.src.rpm
8d2d1a5312c847a422633abde5178733 6.2/alpha/kernel-2.2.16-3.alpha.rpm
358b77b381dcf7e6e95e181eb271f368 6.2/alpha/kernel-BOOT-2.2.16-3.alpha.rpm
3306014cf0d5d3cd6aaf3eb7b495c786 6.2/alpha/kernel-doc-2.2.16-3.alpha.rpm
89e60b43d47202dc7a237e287b60a39f 6.2/alpha/kernel-headers-2.2.16-3.alpha.rpm
6a166b661bc6e6b078d111c2a18ef1bf 6.2/alpha/kernel-smp-2.2.16-3.alpha.rpm
88f53a2105dbf03801b10abc1ddfbbd8 6.2/alpha/kernel-source-2.2.16-3.alpha.rpm
51914ffb09fbe7df6d12a10f713f0b0a 6.2/alpha/kernel-utils-2.2.16-3.alpha.rpm
f639d81c76c4a35332f3f4b8bae40b0c 6.2/i386/kernel-2.2.16-3.i386.rpm
08aa0ee0e630c0b740bca1eb630b598c 6.2/i386/kernel-BOOT-2.2.16-3.i386.rpm
e6de480a599e9b4faa7cceab4ed73ce9 6.2/i386/kernel-doc-2.2.16-3.i386.rpm
438d3cfcf28ca7beb39a94b4bd438cec 6.2/i386/kernel-headers-2.2.16-3.i386.rpm
2b5026d45dc07324324dcb4cf936afe4 6.2/i386/kernel-ibcs-2.2.16-3.i386.rpm
dcdf1ba8a2154b15789a3f660c71c166 6.2/i386/kernel-pcmcia-cs-2.2.16-3.i386.rpm
94a8f4a294d743b78078274ef30722b8 6.2/i386/kernel-smp-2.2.16-3.i386.rpm
409750698f4d7a21ba3527880c2017fe 6.2/i386/kernel-source-2.2.16-3.i386.rpm
4a7bb771616f294803342e71912a2847 6.2/i386/kernel-utils-2.2.16-3.i386.rpm
4deba2b9f3285d63b96daef2bcd599e4 6.2/sparc/kernel-2.2.16-3.sparc.rpm
514d9ce2b85ec5954bf47e609a7f2048 6.2/sparc/kernel-BOOT-2.2.16-3.sparc.rpm
d776ec3b12207a7122e13c802102b731 6.2/sparc/kernel-doc-2.2.16-3.sparc.rpm
43fc3b6f6c71b232407c6099f444d9e8 6.2/sparc/kernel-headers-2.2.16-3.sparc.rpm
3c509252e3d9a681afc2598ad28a688a 6.2/sparc/kernel-smp-2.2.16-3.sparc.rpm
0839ab7161bc75b40b09a0bbf7625a74 6.2/sparc/kernel-source-2.2.16-3.sparc.rpm
a9d8ebf3009225593ca63e9d587bd123 6.2/sparc/kernel-utils-2.2.16-3.sparc.rpm
These packages are GPG signed by Red Hat, Inc. for security. Our key
is available at:
http://www.redhat.com/corp/contact.html
You can verify each package with the following command:
rpm --checksig <filename>
If you only wish to verify that each package has not been corrupted or
tampered with, examine only the md5sum with the following command:
rpm --checksig --nogpg <filename>
8. References:
N/A
From mail@mail.redhat.com Jun 17:33:53 2000 -0400
Received: (qmail 27069 invoked from network); 22 Jun 2000 21:33:53 -0000
Received: from mail.redhat.com (199.183.24.239)
by lists.redhat.com with SMTP; 22 Jun 2000 21:33:53 -0000
Received: from lacrosse.corp.redhat.com (root@lacrosse.corp.redhat.com
[207.175.42.154])
by mail.redhat.com (8.8.7/8.8.7) with ESMTP id RAA04260;
Thu, 22 Jun 2000 17:33:53 -0400
Received: from localhost (porkchop.redhat.com [207.175.42.68])
by lacrosse.corp.redhat.com (8.9.3/8.9.3) with SMTP id RAA01309;
Thu, 22 Jun 2000 17:33:49 -0400
Message-Id: <200006222133.RAA01309@lacrosse.corp.redhat.com>
Subject: [RHSA-2000:038-01] Zope update
Content-transfer-encoding: 8bit
Approved: ewt@redhat.com
To: redhat-watch-list@redhat.com
From: bugzilla@redhat.com
Cc: linux-security@redhat.com, bugtraq@securityfocus.com
Content-type: text/plain; charset="iso-8859-1"
Mime-version: 1.0
Date: Thu, 22 Jun 2000 17:33 -0400
---------------------------------------------------------------------
Red Hat, Inc. Security Advisory
Synopsis: Zope update
Advisory ID: RHSA-2000:038-01
Issue date: 2000-06-22
Updated on: 2000-06-22
Product: Red Hat Powertools
Keywords: Zope
Cross references: N/A
---------------------------------------------------------------------
1. Topic:
Remote vulnerabilities exist with all Zope-2.0 releases.
2. Relevant releases/architectures:
Red Hat Powertools 6.1 - noarch
Red Hat Powertools 6.2 - noarch
3. Problem description:
This hotfix corrects issues with an inadequately protected method in one of the
base classes in the DocumentTemplate package that could allow the contents of
DTMLDocuments or DTMLMethods to be changed remotely or through DTML code without
forcing proper user authorization.
4. Solution:
Users of Red Hat Powertools 6.1 who have not upgraded Zope to the version of
Zope released in Red Hat Powertools 6.2 (2.1.2-5) need to do so prior to
installing this Zope update. The Zope packages from 6.2 are located at:
ftp://ftp.redhat.com/pub/redhat/powertools/6.2/
After you have upgraded to Zope-2.1.2-5 install the Zope-Hotfix package. To
install the update, use this command:
rpm -Uvh Zope-Hotfix-06_16_2000-1.noarch.rpm
Once the Zope-Hotfix package is installed, restart Zope.
5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):
N/A
6. RPMs required:
Red Hat Powertools 6.1:
Red Hat Powertools 6.2:
noarch:
ftp://updates.redhat.com/powertools/6.2/noarch/Zope-Hotfix-06_16_2000-1.noarch.rpm
sources:
ftp://updates.redhat.com/powertools/6.2/SRPMS/Zope-Hotfix-06_16_2000-1.src.rpm
7. Verification:
MD5 sum Package Name
--------------------------------------------------------------------------
9f0f351b44a834ef84f56ae6a6d2a5df 6.2/SRPMS/Zope-Hotfix-06_16_2000-1.src.rpm
dee87d4dd038b1a10f6e46a0883197b3 6.2/noarch/Zope-Hotfix-06_16_2000-1.noarch.rpm
These packages are GPG signed by Red Hat, Inc. for security. Our key
is available at:
http://www.redhat.com/corp/contact.html
You can verify each package with the following command:
rpm --checksig <filename>
If you only wish to verify that each package has not been corrupted or
tampered with, examine only the md5sum with the following command:
rpm --checksig --nogpg <filename>
8. References:
http://www.zope.org/Products/Zope/Hotfix_06_16_2000/security_alert